sogeti-esec-lab / ransomware-xtbl-decrypt-toolLinks
Xtbl Ransomware Decrypt Tool
☆13Updated 9 years ago
Alternatives and similar repositories for ransomware-xtbl-decrypt-tool
Users that are interested in ransomware-xtbl-decrypt-tool are comparing it to the libraries listed below
Sorting:
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Simple shellcode injector.☆13Updated 7 years ago
- Common Malware Techniques☆13Updated 2 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 12 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- A collection of anti disassembly techniques☆20Updated 8 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆34Updated 7 years ago
- load macho files in memory without touching the Disk☆43Updated 3 years ago
- Archive of ransomware decryptors☆34Updated 8 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Updated 9 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 6 years ago
- My articles for Paged Out! #2☆17Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- ☆34Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- ☆46Updated 7 years ago
- ☆28Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Windows Inline function hooking library targeted at MSVC☆27Updated 9 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 8 years ago
- Kernel mode windows NT API logger☆22Updated 6 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- ☆34Updated 8 years ago