Simple list of decrypt tools that could help recover data encrypted by ransomwares
☆17Apr 1, 2016Updated 9 years ago
Alternatives and similar repositories for ransomware-decryptiontool-list
Users that are interested in ransomware-decryptiontool-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- an open source ransomware-like file crypter kit☆13Apr 4, 2016Updated 9 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- CURL-based URIHandler for GStreamer☆13Nov 27, 2024Updated last year
- ☆49Apr 22, 2013Updated 12 years ago
- A wildfire map built with Protomaps and MapLibre☆14Nov 18, 2024Updated last year
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 8 years ago
- Atmel Pack parser, visualizer and fuse calculator☆12Dec 11, 2018Updated 7 years ago
- ☆11Mar 10, 2018Updated 8 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- GStreamer plugin for Steinberg VST3 audio plugins☆20Oct 9, 2017Updated 8 years ago
- ☆13Feb 17, 2015Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- LiveWire protocol monitor for LWCP and LWRP☆11Dec 17, 2024Updated last year
- OAuth Security Cheatsheet☆41May 12, 2014Updated 11 years ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- small ripper script for spotify (rips playlists to mp3 and includes ID3 tags and album covers)☆23Jun 7, 2017Updated 8 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- Wireshark sources, with additional sources for a plugin to read thrift messages☆14Jan 24, 2014Updated 12 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- Tools for generating and reading SDI RP188 timecode with Blackmagic Design Decklinks☆17Nov 22, 2023Updated 2 years ago
- Demo: https://diafygi.github.io/myLock/☆16Jul 28, 2014Updated 11 years ago
- Reader for SG files (Data files of the City Builder games)☆25Jun 18, 2013Updated 12 years ago
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago
- This Repo houses code to control the Uplift Sit-to-Stand Desk from Staples with the jcp35n-blt Bluetooth adapter.☆12May 24, 2022Updated 3 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- A tools help you to get root.☆15Dec 19, 2016Updated 9 years ago
- "Selenium for Android" (Test automate native or hybrid Android apps and the mobile web with Selendroid.) Join us on IRC #selendroid on fr…☆13Dec 11, 2014Updated 11 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- Data Recovery Research☆13Dec 19, 2025Updated 3 months ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago