Locker Decrypter - Python tool to decrypt files encrypted by Locker malware
☆19Jun 8, 2015Updated 10 years ago
Alternatives and similar repositories for locker_decrypter
Users that are interested in locker_decrypter are comparing it to the libraries listed below
Sorting:
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Indexed search and clustering tool for digital forensics☆26Nov 5, 2014Updated 11 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Linux privilege escalation auditing tool☆17Aug 28, 2023Updated 2 years ago
- ☆19Feb 21, 2015Updated 11 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- Fake mail generator for the termux,kali,windows☆29Jan 13, 2025Updated last year
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- 𝘋𝘦𝘤𝘰𝘮𝘱𝘪𝘭𝘦 𝘢𝘯𝘺 𝘱𝘺𝘵𝘩𝘰𝘯 𝘴𝘤𝘳𝘪𝘱𝘵 𝘴𝘵𝘢𝘳𝘵𝘪𝘯𝘨 𝘸𝘪𝘵𝘩 𝘦𝘹𝘦𝘤(𝘮𝘢𝘳𝘴𝘩𝘢𝘭.𝘭𝘰𝘢𝘥𝘴(...☆11Jun 1, 2022Updated 3 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Deflate64 - Decripting Base 64 strings, decompress content (sploits Power Shell)☆10Oct 30, 2017Updated 8 years ago
- a program can dump all marshal in obf code by KhanhNguyen9872☆19Feb 25, 2026Updated last week
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- ☆11Jan 22, 2021Updated 5 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆14Nov 19, 2025Updated 3 months ago
- Nmap enumeration and script scan automation script☆38Mar 7, 2023Updated 2 years ago
- Ultimate List Of Bug Bounty Tools☆10Feb 25, 2023Updated 3 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Tracking Google Enterprise Android Devices☆21Updated this week
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Parser for ELF object format.☆11Dec 24, 2021Updated 4 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- This library is made to help c++ developers in saving their efforts and time and to make c++ like python as much as possible☆12May 23, 2022Updated 3 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago