wikijm / ransomware-decryptiontool-listLinks
Simple list of decrypt tools that could help recover data encrypted by ransomwares
☆17Updated 9 years ago
Alternatives and similar repositories for ransomware-decryptiontool-list
Users that are interested in ransomware-decryptiontool-list are comparing it to the libraries listed below
Sorting:
- ☆25Updated 8 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- Simple DDE object detector☆56Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 9 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- ☆58Updated 10 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Create custom Windows batch files from a configuration file☆32Updated 8 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago