twelvesec / panicbuttonLinks
Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on your pc, then hit the Panic button! Panic Button will dump all of your memory (and potentially the encryption keys of the ransomware) to a file and hibernate your system. Then you should call the IT guys :)
☆30Updated 8 years ago
Alternatives and similar repositories for panicbutton
Users that are interested in panicbutton are comparing it to the libraries listed below
Sorting:
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆14Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆78Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- One-off scripts☆51Updated 8 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- Multi source CVE/exploit parser.☆28Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Archive of leaked Equation Group materials☆16Updated 9 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- Small backdoor using cookie.☆64Updated 8 years ago
- Collection of cracked malware☆15Updated 6 years ago