jdsecurity / CryptoTrooperLinks
The world's first Linux white-box ransomware
☆63Updated 7 years ago
Alternatives and similar repositories for CryptoTrooper
Users that are interested in CryptoTrooper are comparing it to the libraries listed below
Sorting:
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- It contains hardenedlinux community documentation.☆60Updated last year
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- EQGRP-Free-Files here.,☆45Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- Packet-o-matic NG !☆65Updated last week
- Detect snooper on your system!☆84Updated 8 years ago
- ☆12Updated 8 years ago
- Userspace tool to create ext4 encrypted directories.☆51Updated 8 years ago
- BitErrant☆58Updated 8 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- A USB layer firewall for the Linux kernel☆35Updated 7 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆93Updated 6 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Panic button for protection against cold boot attacks☆143Updated 3 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- A Linux shell script to improve your privacy online☆84Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago