Tools for encryption, decryption and cracking from several cryptographic systems.
☆40Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for CryptTools
Users that are interested in CryptTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated last year
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54May 15, 2021Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- Send and receive files or stream data encrypted over a local network.☆14Mar 6, 2023Updated 3 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 7 years ago
- Rogue Access Point Detector☆37Sep 2, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- VMProtect licensing stuff in golang☆15Jun 19, 2024Updated last year
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Sep 22, 2017Updated 8 years ago
- Ruby library for pure SSL/TLS handshake testing. No additional requirements.☆11Nov 8, 2021Updated 4 years ago
- Generate cryptographically secure, memorable passphrases.☆13Jun 4, 2020Updated 5 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆22Jul 7, 2017Updated 8 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 4 months ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 10 years ago
- 🚨 Slack bot for cyber-security phishing☆21Jan 22, 2019Updated 7 years ago
- ☆11Mar 19, 2026Updated last month
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆33Oct 7, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Postfix server container with several features☆17Apr 10, 2018Updated 8 years ago
- A web interface for OpenKore☆13Nov 8, 2016Updated 9 years ago
- My write ups - Capture the flag challanges☆19Nov 18, 2022Updated 3 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago