FauxFaux / truecryptLinks
TrueCrypt from source archives
☆82Updated 10 years ago
Alternatives and similar repositories for truecrypt
Users that are interested in truecrypt are comparing it to the libraries listed below
Sorting:
- You'll never take me alive.☆85Updated 11 years ago
- Encrypted Text Messaging☆148Updated 9 years ago
- Decryption Tool☆147Updated 6 years ago
- Official implementation of the VirusTotal API in C programming language☆114Updated 2 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- Generic binary file parser☆59Updated 11 years ago
- A tool for securing communications between a client and a DNS resolver☆21Updated 10 years ago
- ☆12Updated 8 years ago
- Collection of scripts that were once useful for reverse engineering things☆75Updated 15 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- OBSOLETE. Merged into ubiquitous_bash with both MSW and UNIX guest support. Virtualization wrapper to open Linux files in fresh MS-Window…☆104Updated 13 years ago
- DiskCryptor - Open source partition encryption solution☆42Updated 11 years ago
- Fast TCP encryption☆212Updated 3 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- rasta ring 0 debugger☆77Updated 16 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆29Updated 11 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- A USB layer firewall for the Linux kernel☆36Updated 7 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Primitive TE to PE32 converter☆38Updated 9 months ago
- AFF is now being maintained at https://github.com/sshock/AFFLIBv3☆52Updated 11 years ago
- A kernel extension and userland daemon to patch applications☆103Updated 12 years ago
- Analysis of the Skype VoIP client☆67Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Base OpenXT build scripts☆50Updated 4 years ago
- ☆33Updated 13 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago