The world's first Linux white-box ransomware
☆64Apr 25, 2018Updated 7 years ago
Alternatives and similar repositories for CryptoTrooper
Users that are interested in CryptoTrooper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- A minifilter driver for detecting and blocking ransomware virus☆27Mar 4, 2018Updated 8 years ago
- Fixed memory overflow issue in ProcessHider.☆16May 27, 2018Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- fuckNSA☆40Dec 5, 2013Updated 12 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/hf-2011☆15Feb 12, 2016Updated 10 years ago
- Trevisor - A single guest hypervisor with full disk encryption☆18Sep 19, 2016Updated 9 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A python client for the devtools protocol☆17Apr 7, 2025Updated last year
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 11 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆47Jun 14, 2018Updated 7 years ago
- Debian on a Zyxel NSA310/320 NAS☆27Jan 28, 2013Updated 13 years ago
- Start an bruteforce attack using a combolist.☆10Jun 1, 2022Updated 3 years ago
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Implement communication between c++ and javascript with IWebBrowser2☆21Jan 5, 2025Updated last year
- Kernel-mode file scanner☆19Jul 16, 2018Updated 7 years ago
- Optimizing data-intensive systems in disaggregated data centers☆13Jun 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DHCP attack tool☆22Oct 4, 2024Updated last year
- ☆15Jul 22, 2024Updated last year
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- 娜迦DEX文件修复程序☆25Aug 3, 2017Updated 8 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- tiny embedded MIPS virtualization platform - a very small and lean hypervisor using MIPS R5 hardware VZ option for embedded systems (IoT …☆20Sep 26, 2023Updated 2 years ago
- Shellcode generation for eCOS platform.☆14Mar 13, 2021Updated 5 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The WDK 8.0 Samples from Microsoft☆20Sep 21, 2013Updated 12 years ago
- Zero-Day Code Injection and Persistence Technique☆31Mar 23, 2017Updated 9 years ago
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- 基于MiniFilter和Sfilter的加解密☆24Jun 4, 2019Updated 6 years ago
- Result of the Android security research☆17Feb 16, 2017Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago