Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).
☆52Jun 24, 2021Updated 4 years ago
Alternatives and similar repositories for Sekura
Users that are interested in Sekura are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LuaJIT binding to libc☆16Nov 18, 2015Updated 10 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Mar 7, 2023Updated 3 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- A simple polymorphic engine☆21Jun 5, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆39May 20, 2023Updated 2 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Managed code hooking template.☆108Feb 15, 2021Updated 5 years ago
- A Prometheus exporter for Tesla vehicles☆16Jul 12, 2024Updated last year
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- Password manager for Neovim☆17Jul 4, 2022Updated 3 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- A full-featured and high-performance (see benchmark) event loop that is loosely modelled after libevent, but without its limitations and …☆11Dec 2, 2024Updated last year
- A recreation of the Windows XP environment☆18Aug 11, 2025Updated 7 months ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 3 years ago
- SNIF ~ e2e TLS trust for IoT☆16Sep 7, 2024Updated last year
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 10 months ago
- ☆28Dec 28, 2017Updated 8 years ago