Python module to encrypt/decrypt messages using the Solfa cipher.
☆21Jun 10, 2017Updated 8 years ago
Alternatives and similar repositories for Solfa
Users that are interested in Solfa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- 微信自动化处理工具☆12Nov 16, 2024Updated last year
- 耐斯特广告联盟☆14Oct 8, 2025Updated 6 months ago
- An android gradle plugin for enhance compiler and reduce cost time in building☆15Jul 24, 2023Updated 2 years ago
- Example of CocosCreator☆16Jun 18, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 【hrml】超莉沫酱自慰语言!☆14Jan 12, 2021Updated 5 years ago
- 今日校园自动提交最新签到,排行榜自动刷赞,自定义图片链接,邮件提醒,多线程保持登录。java实现☆12Oct 30, 2020Updated 5 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- String obfuscator based on the Mealy automata☆13Sep 16, 2017Updated 8 years ago
- 快速开发Android MVVM应用程序模板☆25Dec 24, 2018Updated 7 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Jun 7, 2013Updated 12 years ago
- COVA - A static analysis tool to compute path conditions☆40Mar 2, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a small tool for auditting weak ssh password☆23Feb 24, 2018Updated 8 years ago
- Probabilistic Itemset Mining☆19Jun 22, 2016Updated 9 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- mini http server for Java (android)☆17Dec 7, 2018Updated 7 years ago
- Disassemblers with various trimming methodologies☆15Mar 22, 2026Updated last month
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Apr 23, 2019Updated 7 years ago
- ☆11Jan 3, 2018Updated 8 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Jul 7, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 游戏编程模式中文☆26Aug 12, 2014Updated 11 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Bidirectional transformation for Relational view update Datalog-based Strategies☆22Jul 5, 2023Updated 2 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- bypass warning.or.kr in korea☆29Aug 24, 2021Updated 4 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 5 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Linux assembly language minimal 'dynamic ELF' example plus experiments☆25May 22, 2020Updated 5 years ago