wikijm / ransomware-decryptiontool-list
Simple list of decrypt tools that could help recover data encrypted by ransomwares
☆17Updated 8 years ago
Alternatives and similar repositories for ransomware-decryptiontool-list:
Users that are interested in ransomware-decryptiontool-list are comparing it to the libraries listed below
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆20Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- See here:☆42Updated 12 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- ☆25Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- ☆57Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago