Tools for encryption, decryption and cracking from several cryptographic systems.
☆40Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for CryptTools
Users that are interested in CryptTools are comparing it to the libraries listed below
Sorting:
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Obfuscate specific windows apis with different apis☆12Jul 31, 2024Updated last year
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated last year
- OSINT and Digital Investigation tool for Twitter☆27Feb 17, 2018Updated 8 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54May 15, 2021Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Rogue Access Point Detector☆37Sep 2, 2024Updated last year
- grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL☆17Jan 27, 2022Updated 4 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- de1ctf 2020 mc challs - mc系列题目☆18May 6, 2020Updated 5 years ago
- VMProtect licensing stuff in golang☆15Jun 19, 2024Updated last year
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- ☆11Mar 9, 2016Updated 10 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 8 months ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Ida Pro plugin☆29Oct 22, 2018Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 3 months ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- social media intelligence from the command line☆44Nov 16, 2025Updated 4 months ago
- LogZilla NetOps Platform: Network Insight, Simplified☆21Feb 21, 2026Updated last month
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Generate valid looking random MAC address☆17Feb 13, 2014Updated 12 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- ☆15May 17, 2018Updated 7 years ago