ANONYMOUSLGD's repositories

ransomware-decryptors

Ransomware Decryptors

Stargazers:1Issues:0Issues:0

reko

Reko is a binary decompiler.

Language:C#License:GPL-2.0Stargazers:1Issues:0Issues:0

APT_Digital_Weapon

Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.

License:GPL-3.0Stargazers:0Issues:0Issues:0

APT_REPORT

Interesting apt report collection and some special ioc express

Stargazers:0Issues:0Issues:0

C-Plus-Plus

Collection of various algorithms in mathematics, machine learning, computer science and physics implemented in C++ for educational purposes.

License:MITStargazers:0Issues:0Issues:0

capemon

capemon: CAPE's monitor

License:GPL-3.0Stargazers:0Issues:0Issues:0

Ciphey

⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡

License:MITStargazers:0Issues:0Issues:0
License:BSD-3-ClauseStargazers:0Issues:0Issues:0

ghidra-findcrypt

Ghidra analysis plugin to locate cryptographic constants

License:GPL-3.0Stargazers:0Issues:0Issues:0

Graverobber

PoC Ransomware payload. Any malicious use of this code is strictly prohibited.

License:MITStargazers:0Issues:0Issues:0

haiti

:key: Hash type identifier (CLI & lib)

License:MITStargazers:0Issues:0Issues:0

hosts

🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.

License:MITStargazers:0Issues:0Issues:0

IruPlori

👽💫A ransomware for the windows operating system.

License:MITStargazers:0Issues:0Issues:0

libvxshare

Unofficial VirusShare API Wrapper

License:MITStargazers:0Issues:0Issues:0

malicious-pdf

💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

License:BSD-2-ClauseStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

malware-sample-library

Malware sample library.

Stargazers:0Issues:0Issues:0

malware_notes

my malware analysis notes

Stargazers:0Issues:0Issues:0

Mirai-Source-Code

Leaked Mirai Source Code for Research/IoC Development Purposes

License:GPL-3.0Stargazers:0Issues:0Issues:0

pe_to_shellcode

Converts PE into a shellcode

License:BSD-2-ClauseStargazers:0Issues:0Issues:0

public-apis

A collective list of free APIs

License:MITStargazers:0Issues:0Issues:0

Ransomware-Reports

This repo is a collection of Ransomware reports from vendors, researchers, etc.

Stargazers:0Issues:0Issues:0

rules

Repository of yara rules

License:GPL-2.0Stargazers:0Issues:0Issues:0

S4VEtheD4TE

Ransomware written in C# using Windows Forms

License:GPL-3.0Stargazers:0Issues:0Issues:0
License:NOASSERTIONStargazers:0Issues:0Issues:0

Triton

Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.

License:Apache-2.0Stargazers:0Issues:0Issues:0

Ukraine-Cyber-Operations

Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.

Stargazers:0Issues:0Issues:0

wafw00f

WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

Xonory

The Xonory Programming Language For Advanced Malware Development

Stargazers:0Issues:0Issues:0

yara

The pattern matching swiss knife

License:BSD-3-ClauseStargazers:0Issues:0Issues:0