sogeti-esec-lab / ransomware-xtbl-decrypt-tool
Xtbl Ransomware Decrypt Tool
☆12Updated 8 years ago
Alternatives and similar repositories for ransomware-xtbl-decrypt-tool:
Users that are interested in ransomware-xtbl-decrypt-tool are comparing it to the libraries listed below
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- ☆28Updated 7 years ago
- ☆13Updated 7 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆12Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Updated 9 years ago
- ☆32Updated 6 years ago
- reversed emet tool☆24Updated 12 years ago
- ☆10Updated 7 years ago
- Brand New Code Injection for Windows https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows☆18Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Updated 10 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- DbgFlashVul☆12Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- ☆14Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago