Ransomware Decryptors
☆35Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for ransomware-decryptors
Users that are interested in ransomware-decryptors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All-in-One Ransomware Decryption Tools (Unofficial Mirror)☆53Aug 21, 2021Updated 4 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆46Mar 11, 2018Updated 8 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- Malware sample library.☆595Nov 21, 2023Updated 2 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Windows Privilege Escalation Labs☆18May 10, 2021Updated 4 years ago
- Ransomware recovery app for Nextcloud☆25Jan 4, 2023Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 4 months ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆31Updated this week
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Ranflood ransomware contrast tool☆18Dec 18, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- A Docker image of Knot DNS Resolver with hBlock.☆34Apr 1, 2026Updated 2 weeks ago
- ☆36Sep 25, 2020Updated 5 years ago
- Temporary image hosting service based on Google App Engine and Google Cloud Storage.☆10Dec 26, 2021Updated 4 years ago
- A Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.☆25Dec 27, 2016Updated 9 years ago
- ☆12Aug 27, 2017Updated 8 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- This program detects all present and future ransomware in Windows file shares or local drives for Windows file servers. I created this w…☆19Dec 18, 2023Updated 2 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆50Updated this week
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago