websec / EduRansW-Educational-RansomwareLinks
EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vriants.
☆13Updated 8 months ago
Alternatives and similar repositories for EduRansW-Educational-Ransomware
Users that are interested in EduRansW-Educational-Ransomware are comparing it to the libraries listed below
Sorting:
- BINARLY Research Tools and PoCs☆39Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- Developing an open source Windows EDR written in C & C++ & C#☆25Updated 7 months ago
- Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)☆60Updated 3 weeks ago
- ☆63Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A Repository to Track Anti-Forensic Techniques☆118Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated last month
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated 2 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- ☆27Updated last year
- create a "simulated internet" cyber range environment☆19Updated last week
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago
- ☆84Updated last year
- ☆35Updated 2 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 2 months ago
- ☆38Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- ☆48Updated 6 months ago
- ☆16Updated last year
- ☆26Updated 2 years ago
- ☆49Updated 2 years ago