mstfknn / ransomware-decryptors
Ransomware Decryptors
☆34Updated 2 years ago
Alternatives and similar repositories for ransomware-decryptors:
Users that are interested in ransomware-decryptors are comparing it to the libraries listed below
- ☆16Updated 6 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 10 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆18Updated 4 years ago
- My Shellcode Archive☆28Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 3 years ago
- ☆22Updated 4 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Windows log and threat hunting with powershell☆16Updated 4 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆16Updated 8 years ago
- Random stuff☆16Updated 6 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- ☆11Updated 7 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago