CryptoWall 3.0 Ransomware Reversing Documentation & Scripts
☆17Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for CryptoWall_Analysis
Users that are interested in CryptoWall_Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 5 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp …☆19Jun 9, 2013Updated 12 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- NoSQL Injection Demo Application☆13Oct 18, 2013Updated 12 years ago
- ALLES! CTF 2020 Challenges☆10Sep 21, 2020Updated 5 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- A browser based bitcoin miner☆16Dec 15, 2013Updated 12 years ago
- Automated cryptocurrency bot that uses market metrics and machine learning to make trades☆12Oct 19, 2020Updated 5 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- react frontend for swapping, staking and unstaking TRC20 tokens on the Tron blockchain☆13Mar 24, 2021Updated 4 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Jun 12, 2020Updated 5 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Mines bitcoin in the browser using WebGL to compute the hashes and a server to negotiate the stratum mining protocol and coordinate clien…☆20Mar 18, 2022Updated 4 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- ☆11Aug 14, 2021Updated 4 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- mac changer and tor re-starter this script restart tor service every 17 sec!☆17Apr 24, 2022Updated 3 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ☆14Apr 29, 2019Updated 6 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- 获取浏览器保存密码,支持IE、Chrome和火狐☆12Oct 30, 2019Updated 6 years ago
- ☆17Feb 29, 2020Updated 6 years ago