CryptoWall 3.0 Ransomware Reversing Documentation & Scripts
☆17Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for CryptoWall_Analysis
Users that are interested in CryptoWall_Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- NoSQL Injection Demo Application☆13Oct 18, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- A collection of anti disassembly techniques☆21Jul 22, 2017Updated 8 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- react frontend for swapping, staking and unstaking TRC20 tokens on the Tron blockchain☆13Mar 24, 2021Updated 5 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Jun 12, 2020Updated 5 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 5 years ago
- Open source Anti Debug methods to use for your games. This uses SAC as an example. Will be sure to update it and / or add new features in…☆18Nov 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- A small utility to run raw code chunks in the executable memory area.☆16Feb 6, 2015Updated 11 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Aug 31, 2017Updated 8 years ago
- mac changer and tor re-starter this script restart tor service every 17 sec!☆16Apr 24, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- Mines bitcoin in the browser using WebGL to compute the hashes and a server to negotiate the stratum mining protocol and coordinate clien…☆22Mar 18, 2022Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- ☆14Apr 29, 2019Updated 7 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated Position Manager for Bybit that will use trailing profit and stop loss to close your positions.☆20Feb 12, 2020Updated 6 years ago
- 获取浏览器保存密码,支持IE、Chrome和火狐☆12Oct 30, 2019Updated 6 years ago
- ☆16Feb 29, 2020Updated 6 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆33May 7, 2024Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago