hasherezade / petya_recovery
Application for cracking Red Petya key based on genetic algorithms.
☆52Updated 2 years ago
Alternatives and similar repositories for petya_recovery:
Users that are interested in petya_recovery are comparing it to the libraries listed below
- ☆68Updated 7 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆86Updated 6 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆85Updated 11 months ago
- ☆46Updated 7 years ago
- Live Dangerous Linux Malware Samples!☆21Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆88Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Updated 6 years ago
- A warehouse for your malware☆134Updated 11 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- See here:☆42Updated 12 years ago
- Archive of ransomware decryptors☆29Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆67Updated 9 years ago
- Passive UAC elevation using dll infection☆73Updated 10 years ago
- Various scripts for different malware families☆104Updated 3 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- NCC Group Ransomware Simulator☆69Updated 8 years ago
- library to decode/parse zeus-like configuration files☆29Updated 6 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Lightweight TCP botnet coded in C++☆27Updated 6 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆87Updated last year