sogeti-esec-lab / ransomware-xtbl-decrypt-toolLinks
Xtbl Ransomware Decrypt Tool
☆12Updated 9 years ago
Alternatives and similar repositories for ransomware-xtbl-decrypt-tool
Users that are interested in ransomware-xtbl-decrypt-tool are comparing it to the libraries listed below
Sorting:
- SDBbot Unpacker Python 2.7☆9Updated 5 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Updated 8 years ago
- ☆13Updated 8 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- Archive of ransomware decryptors☆30Updated 7 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆34Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- Common Malware Techniques☆14Updated 2 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- ☆22Updated 8 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- This project has been moved from a private repository☆26Updated 7 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆26Updated 4 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- Ring3 Rootkit Backdoor.☆42Updated 10 years ago