jamestiotio / NoMoreRansomLinks
All-in-One Ransomware Decryption Tools (Unofficial Mirror)
☆53Updated 4 years ago
Alternatives and similar repositories for NoMoreRansom
Users that are interested in NoMoreRansom are comparing it to the libraries listed below
Sorting:
- ☆53Updated 4 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Updated 8 years ago
- Repository of tools used in my blog☆51Updated last year
- python hash cracker☆52Updated last year
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 7 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Windows anti-forensics USB monitoring tool.☆69Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Low Interaction Mobile Honeypot☆96Updated 6 months ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated last month
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 6 years ago
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- Unicode encoding attacks with machine learning☆97Updated 4 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆170Updated 3 years ago
- ☆27Updated 4 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆47Updated 9 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆30Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- HTTP botnet☆62Updated 9 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆34Updated 4 years ago