jdsecurity / CryptoTrooperLinks
The world's first Linux white-box ransomware
☆64Updated 7 years ago
Alternatives and similar repositories for CryptoTrooper
Users that are interested in CryptoTrooper are comparing it to the libraries listed below
Sorting:
- Packet-o-matic NG !☆65Updated last month
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- BitErrant☆58Updated 8 years ago
- WPA2 passphrase recovery tool for UPC%07d devices☆59Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Decryption Tool☆145Updated 6 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- ☆118Updated 4 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- ☆25Updated 8 years ago
- Tool to disable Intel AMT on Windows☆141Updated 8 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- Small EFI utility that clears the power-on and setup passwords in IBM x3550/x3650 M3 servers☆46Updated 4 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Updated 7 years ago
- Free sampling of files from the purported Equation Group hack.☆188Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Updated 7 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- My tool for working with Intel Management Engine - RETIRED REPO (see coreboot for new upstream)☆159Updated 6 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆93Updated 6 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 6 years ago