☆15Feb 20, 2026Updated last month
Alternatives and similar repositories for CryptoLectures
Users that are interested in CryptoLectures are comparing it to the libraries listed below
Sorting:
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- Dead simple frontend alternative for LanguageTool compatible API☆27Jan 2, 2026Updated 2 months ago
- ☆14Dec 14, 2020Updated 5 years ago
- Superion Mutator for AFLPlusPlus☆31Dec 5, 2023Updated 2 years ago
- Create epicycle animations.☆16Jul 9, 2018Updated 7 years ago
- Mod for the game NERTS! Online☆14May 21, 2022Updated 3 years ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- ☆22Apr 29, 2024Updated last year
- reverse engninering & pwn writeup☆26Sep 20, 2020Updated 5 years ago
- The buffering backend for any Cursive backend☆19Aug 8, 2024Updated last year
- Reticulum Nomadnet Standalone Browser☆62Dec 16, 2025Updated 3 months ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆30Nov 21, 2023Updated 2 years ago
- Modern replacement PCB for the IBM Model M 122☆26Aug 19, 2024Updated last year
- Generates Natvis for debug visualization of Rust code☆35Nov 14, 2024Updated last year
- ☆35Jun 22, 2021Updated 4 years ago
- Docker Compose для Container Manager в Synology DSM 7.2☆27May 9, 2025Updated 10 months ago
- FNR is a small domain block cipher to encrypt small objects ( < 128 bits )☆40Dec 7, 2017Updated 8 years ago
- A basc table view compnent for cursive.☆52Aug 2, 2024Updated last year
- .NET tool to analyze size of Native AOT binaries.☆55Nov 3, 2025Updated 4 months ago
- ☆116Feb 29, 2024Updated 2 years ago
- A Mythic agent for Windows written in C☆162Mar 1, 2026Updated 2 weeks ago
- Poseidon is a Golang agent targeting Linux and macOS☆208Updated this week
- Root shell PoC for CVE-2021-3156☆156Feb 13, 2022Updated 4 years ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆313Dec 29, 2025Updated 2 months ago
- A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.☆214Oct 10, 2025Updated 5 months ago
- ☆234Jun 10, 2025Updated 9 months ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆335Mar 11, 2026Updated last week
- 👓A collection of papers/tools/exploits for UEFI security.☆213Sep 4, 2025Updated 6 months ago
- ☆249Feb 19, 2026Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- Fuzzing JavaScript Engines with Aspect-preserving Mutation☆231Oct 18, 2023Updated 2 years ago
- ☆264Jul 4, 2023Updated 2 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆438Jun 27, 2025Updated 8 months ago
- AdaptixFramework Extension Kit☆441Feb 28, 2026Updated 2 weeks ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆326Apr 12, 2024Updated last year
- A Binary Ninja plugin for vulnerability research.☆301Sep 7, 2024Updated last year
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago