jdsecurity / CryptoTrooperLinks
The world's first Linux white-box ransomware
☆64Updated 7 years ago
Alternatives and similar repositories for CryptoTrooper
Users that are interested in CryptoTrooper are comparing it to the libraries listed below
Sorting:
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 9 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 9 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- ☆118Updated 5 years ago
- Hohha Dynamic XOR Encryption Algorithm☆55Updated 6 years ago
- Decryption Tool☆147Updated 6 years ago
- Packet-o-matic NG !☆64Updated 6 months ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- BitErrant☆59Updated 8 years ago
- A USB layer firewall for the Linux kernel☆36Updated 7 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Updated 9 years ago
- Tool to disable Intel AMT on Windows☆146Updated 8 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆93Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆81Updated 6 years ago
- ☆84Updated 7 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆94Updated 7 years ago