A python3 RC4 implementation that doesn't suck. (i.e. it's actually binary-safe...)
☆19Sep 3, 2024Updated last year
Alternatives and similar repositories for rc4
Users that are interested in rc4 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple idea capturing web app☆90Mar 3, 2015Updated 11 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- Nim-IDA-FLIRT-Generator☆20Dec 5, 2023Updated 2 years ago
- Base service class from Assemblyline 4☆15Updated this week
- Frida example to trace VBA CreateObject calls and some string deobfuscations calls. You need latest Frida 12.9.8 for improved symbol look…☆25Sep 3, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 8 months ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- Web interface and APIs for Assemblyline 4☆20Updated this week
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- ☆32Apr 24, 2022Updated 3 years ago
- ☆10Jul 10, 2015Updated 10 years ago
- quickly inject dylibs into an IPA without fully unzipping☆13Dec 17, 2023Updated 2 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- ☆10Jun 28, 2024Updated last year
- Stanford Cryptography class excercises☆20May 13, 2012Updated 13 years ago
- Recovered samples, extracted Wasm/binaries, decoded payloads & analysis scripts from the Coruna iOS/macOS exploit kit (b27.icu). 28 JS mo…☆35Mar 9, 2026Updated 2 weeks ago
- iOS kernel memory explorer☆16Feb 9, 2024Updated 2 years ago
- Mach-O view plugin☆20Mar 7, 2024Updated 2 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆39Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- STL-like Lua tables in C++☆13Jun 22, 2024Updated last year
- Java runtime interop from Frida☆22Nov 10, 2025Updated 4 months ago
- An extremely experimental Binary Ninja importer for the type layout information emitted by the -Zprint-type-sizes flag of the Rust compil…☆38Mar 19, 2026Updated last week
- Queries a McAfee ESM for inactive data sources.☆10Dec 16, 2019Updated 6 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- This program implements port knocking for access to Windows via RDP / TS☆16Apr 5, 2021Updated 4 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Evtx to Splunk ingestor☆16Mar 18, 2022Updated 4 years ago
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆29Nov 2, 2025Updated 4 months ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- ☆16Jul 14, 2024Updated last year
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago