jdsecurity / CryptoTrooper
The world's first Linux white-box ransomware
☆63Updated 7 years ago
Alternatives and similar repositories for CryptoTrooper:
Users that are interested in CryptoTrooper are comparing it to the libraries listed below
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Packet-o-matic NG !☆65Updated 9 months ago
- Security advisories☆169Updated 8 years ago
- GRand Unified Bootloader http://www.gnu.org/software/grub/grub.html☆38Updated 7 years ago
- Userspace tool to create ext4 encrypted directories.☆51Updated 8 years ago
- ☆25Updated 7 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆77Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Tools to help detect Hacking Team malware☆80Updated 9 years ago
- Python bindings for hashcat☆58Updated 5 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- It contains hardenedlinux community documentation.☆60Updated last year
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- Hohha Dynamic XOR Encryption Algorithm☆54Updated 5 years ago
- ☆137Updated 7 years ago