jamestiotio / NoMoreRansom
All-in-One Ransomware Decryption Tools (Unofficial Mirror)
☆47Updated 3 years ago
Alternatives and similar repositories for NoMoreRansom
Users that are interested in NoMoreRansom are comparing it to the libraries listed below
Sorting:
- ☆52Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Updated 4 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆16Updated 8 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- ☆24Updated 2 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆54Updated 3 years ago
- WiFi arsenal☆16Updated 5 years ago
- ☆33Updated 3 months ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago
- Nexus of Android banking Trojans☆15Updated last year
- ☆8Updated 2 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 8 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 7 months ago
- A simple "ransomware" using powershell☆14Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- An automated e-mail OSINT tool☆21Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Host IDS for desktop users☆11Updated 4 years ago