wikijm / ransomware-decryptiontool-list
Simple list of decrypt tools that could help recover data encrypted by ransomwares
☆17Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for ransomware-decryptiontool-list
- Oracle Attacks Tool☆13Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- Tools for NTDS.dit☆17Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- EmPyre Web Interface☆12Updated 7 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Gmail Knocker☆21Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆29Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- Scripts for encoding files through DNS TXT records☆11Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Format string exploit generation☆9Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- ☆25Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago