knownsec / Decrypt-ransomware
☆37Updated 6 years ago
Alternatives and similar repositories for Decrypt-ransomware:
Users that are interested in Decrypt-ransomware are comparing it to the libraries listed below
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- CVE-2018-6546-Exploit☆41Updated 6 years ago
- web Log Forensics☆9Updated 10 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- Win32k Elevation of Privilege Poc☆24Updated 5 years ago
- exploitable 3rd-party web applications on a network☆9Updated 5 years ago
- carbanak\group_ib_smart_boys☆12Updated 6 years ago
- CVE-2019-12949☆26Updated 5 years ago
- ☆13Updated 11 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- Python implementation of RSA reverse shell.☆11Updated 8 years ago
- Slide deck for DefCon Beijing☆39Updated 6 years ago
- ☆15Updated 9 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Updated 8 years ago
- Penetration Test Framwork☆22Updated 6 years ago
- All about the remote administrative tools☆36Updated 9 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 6 years ago
- interesting analysis☆16Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Code, commands, and chatter about Threat Hunting.☆35Updated 5 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 7 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- ☆47Updated 9 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- Exploit the vulnerability to execute the calculator☆68Updated 7 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆43Updated 7 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago