jdsecurity / CryptoTrooper
The world's first Linux white-box ransomware
☆62Updated 6 years ago
Alternatives and similar repositories for CryptoTrooper:
Users that are interested in CryptoTrooper are comparing it to the libraries listed below
- Detect snooper on your system!☆83Updated 7 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 7 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Packet-o-matic NG !☆65Updated 5 months ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- BitErrant☆58Updated 7 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- Hohha Dynamic XOR Encryption Algorithm☆54Updated 5 years ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Updated 5 years ago
- Small EFI utility that clears the power-on and setup passwords in IBM x3550/x3650 M3 servers☆46Updated 4 years ago
- Proof of concept for UPC UBEE router hack - WPA2 password generator☆58Updated 8 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- It contains hardenedlinux community documentation.☆60Updated last year
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 7 years ago
- My presentations and papers☆46Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Some NSE scripts to search information from routers☆37Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 5 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago