Crypticator / ModDiv
A fast public key cryptosystem
☆9Updated 9 years ago
Alternatives and similar repositories for ModDiv:
Users that are interested in ModDiv are comparing it to the libraries listed below
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆33Updated 7 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆58Updated 12 years ago
- Windows Software Exploitation☆130Updated 8 years ago
- Automatic detection of hashing algorithms☆21Updated 8 years ago
- Automated Cyber Offense☆89Updated 6 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 7 years ago
- ArchPwn security linux live project☆19Updated 14 years ago
- Malware management program and tools☆26Updated 9 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 2 months ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 5 months ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Free sampling of files from the purported Equation Group hack.☆10Updated 8 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- ☆68Updated 7 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Information Security News☆61Updated last year
- Various malware, packer, crypter, etc. detection and analysis tools☆88Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago