ANONYMOUSLGD's repositories
ransomware-decryptors
Ransomware Decryptors
APT_Digital_Weapon
Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
APT_REPORT
Interesting apt report collection and some special ioc express
C-Plus-Plus
Collection of various algorithms in mathematics, machine learning, computer science and physics implemented in C++ for educational purposes.
capemon
capemon: CAPE's monitor
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
ghidra-findcrypt
Ghidra analysis plugin to locate cryptographic constants
Graverobber
PoC Ransomware payload. Any malicious use of this code is strictly prohibited.
haiti
:key: Hash type identifier (CLI & lib)
hosts
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
IruPlori
👽💫A ransomware for the windows operating system.
libvxshare
Unofficial VirusShare API Wrapper
malicious-pdf
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
malware-sample-library
Malware sample library.
malware_notes
my malware analysis notes
Mirai-Source-Code
Leaked Mirai Source Code for Research/IoC Development Purposes
pe_to_shellcode
Converts PE into a shellcode
public-apis
A collective list of free APIs
Ransomware-Reports
This repo is a collection of Ransomware reports from vendors, researchers, etc.
rules
Repository of yara rules
S4VEtheD4TE
Ransomware written in C# using Windows Forms
thc-hydra
hydra
Triton
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
wafw00f
WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
Xonory
The Xonory Programming Language For Advanced Malware Development
yara
The pattern matching swiss knife