wikijm / ransomware-decryptiontool-list
Simple list of decrypt tools that could help recover data encrypted by ransomwares
☆17Updated 9 years ago
Alternatives and similar repositories for ransomware-decryptiontool-list:
Users that are interested in ransomware-decryptiontool-list are comparing it to the libraries listed below
- Oracle Attacks Tool☆13Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- See here:☆42Updated 12 years ago
- EmPyre Web Interface☆12Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Gmail Knocker☆21Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- ☆20Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago