CryptoWall 3.0 Ransomware Reversing Documentation & Scripts
☆17Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for CryptoWall_Analysis
Users that are interested in CryptoWall_Analysis are comparing it to the libraries listed below
Sorting:
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- NoSQL Injection Demo Application☆13Oct 18, 2013Updated 12 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Sep 12, 2014Updated 11 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- de4dot mod by HTC & Ngôn Nguyễn☆28Aug 18, 2020Updated 5 years ago
- Cutter Instruction Reference Plugin☆30Jan 31, 2021Updated 5 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Jun 12, 2020Updated 5 years ago
- Implementation for Processing.org of the Hough Transform to locate straight lines in images☆11Mar 4, 2013Updated 12 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- black Ip lists, dorks-collection☆16Updated this week
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- K-means Clustering Algorithm in C#☆10Apr 30, 2014Updated 11 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated last month
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Automated cryptocurrency bot that uses market metrics and machine learning to make trades☆13Oct 19, 2020Updated 5 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆12Mar 20, 2024Updated last year
- ☆12Aug 19, 2017Updated 8 years ago