mstfknn / ransomware-decryptorsLinks
Ransomware Decryptors
☆36Updated 3 years ago
Alternatives and similar repositories for ransomware-decryptors
Users that are interested in ransomware-decryptors are comparing it to the libraries listed below
Sorting:
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆56Updated last year
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Updated 8 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 3 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- ☆16Updated 10 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- ☆49Updated 5 years ago
- ☆17Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- ☆14Updated 6 years ago
- A Linux RAT in C☆33Updated 7 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- ☆15Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Random stuff☆16Updated 7 years ago
- ☆43Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago