Skip to content

Instantly share code, notes, and snippets.

View mai1x9's full-sized avatar
🐢
I may be slow to respond.

Sai Mahidhar mai1x9

🐢
I may be slow to respond.
  • TraQez Private Limited
  • Hyderabad, India
  • 17:31 (UTC +05:30)
View GitHub Profile

#petya #petrWrap #notPetya

Win32/Diskcoder.Petya.C

Ransomware attack.

About

This gist was built by the community of the researchers and was scribed by Kir and Igor from the QIWI/Vulners. We are grateful for the help of all those who sent us the data, links and information. Together we can make this world a better place!

Gist updates

@bencord0
bencord0 / lb.py
Created October 9, 2016 00:08
asyncio (dumb TCP) load balancer
#!/usr/bin/env python3
"""
usage: lb.py [listening_port] [backend_host] [backend_port]
Only specify one backend host/port. It is expected that
other backends can be discovered by DNS at connect time.
Useful if, say, your backends are on fully dynamic addresses,
but you have a sensible DNS server in front of them.
"""
import argparse
import asyncio
@cephurs
cephurs / blacklist.txt
Created February 26, 2016 03:42 — forked from jedisct1/blacklist.txt
2500+ IP malicious IP addresses
2500+ IP addresses dedicated to serving malware.
1.168.33.91
103.12.217.155
103.242.11.1
103.242.11.94
103.243.51.129
103.253.141.43
103.255.101.168