sogeti-esec-lab / ransomware-xtbl-decrypt-toolLinks
Xtbl Ransomware Decrypt Tool
☆13Updated 9 years ago
Alternatives and similar repositories for ransomware-xtbl-decrypt-tool
Users that are interested in ransomware-xtbl-decrypt-tool are comparing it to the libraries listed below
Sorting:
- My manual analysis of malware families☆13Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Updated 9 years ago
- Archive of ransomware decryptors☆33Updated 7 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Code injection via delay load libraries☆35Updated 8 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Updated 7 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- ☆33Updated 7 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Updated 9 years ago
- ☆36Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Kernel mode windows NT API logger☆22Updated 6 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- Brand New Code Injection for Windows https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows☆18Updated 9 years ago
- Slides of 44Con 2018☆22Updated 7 years ago
- Common Malware Techniques☆13Updated 2 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- My articles for Paged Out! #2☆17Updated 5 years ago