Simple list of decrypt tools that could help recover data encrypted by ransomwares
☆17Apr 1, 2016Updated 10 years ago
Alternatives and similar repositories for ransomware-decryptiontool-list
Users that are interested in ransomware-decryptiontool-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- an open source ransomware-like file crypter kit☆13Apr 4, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- YARA package for Sublime Text☆19Nov 30, 2025Updated 5 months ago
- ☆49Apr 22, 2013Updated 13 years ago
- A wildfire map built with Protomaps and MapLibre☆14Nov 18, 2024Updated last year
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 9 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- How to create stickers and files for creating stickers☆32Dec 31, 2023Updated 2 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- C++实现键盘记录器☆10Sep 15, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 10 years ago
- Wireshark sources, with additional sources for a plugin to read thrift messages☆14Jan 24, 2014Updated 12 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- Demo: https://diafygi.github.io/myLock/☆16Jul 28, 2014Updated 11 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This Repo houses code to control the Uplift Sit-to-Stand Desk from Staples with the jcp35n-blt Bluetooth adapter.☆12May 24, 2022Updated 3 years ago
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆12Aug 8, 2023Updated 2 years ago
- A tools help you to get root.☆15Dec 19, 2016Updated 9 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 10 years ago
- "Selenium for Android" (Test automate native or hybrid Android apps and the mobile web with Selendroid.) Join us on IRC #selendroid on fr…☆13Dec 11, 2014Updated 11 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Sep 24, 2014Updated 11 years ago
- Data Recovery Research☆13Dec 19, 2025Updated 4 months ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- Code for projecting volumetric nifti files to HCP surface and Glasser atlas parcel-wise value extraction☆13May 21, 2023Updated 2 years ago
- ☆49Dec 6, 2019Updated 6 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Simple Bash script which uses Link Quality to locate Bluetooth device radios☆14Feb 6, 2021Updated 5 years ago