A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm
☆23Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for AixCrypt
Users that are interested in AixCrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆23Dec 30, 2021Updated 4 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆42Nov 12, 2021Updated 4 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆53Dec 22, 2021Updated 4 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆80Mar 15, 2024Updated 2 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆109Dec 30, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Input/Output Assembly Header coded by me.☆10Sep 30, 2023Updated 2 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆22Oct 2, 2023Updated 2 years ago
- Moverse's Official Website☆10Mar 14, 2022Updated 4 years ago
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆84Apr 7, 2022Updated 4 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 4 years ago
- A Fortnite HTTP/XMPP bot coded in JavaScript with party capabilities.☆11Sep 3, 2024Updated last year
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- external hack for Among Us (PATCHED)☆37Aug 8, 2021Updated 4 years ago
- Automatically create an fake account and star a repository.☆16Jun 2, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- All about gaining Power, Influence and Control, manipulation, deception and more...☆19May 8, 2024Updated last year
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆61Oct 27, 2021Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- V7x Fishing Tool☆45Mar 3, 2024Updated 2 years ago
- High-speed lossless data compression of 16 to 512 bytes--get better average compression than QuickLZ for 512-byte blocks. td512 maintains…☆27Feb 14, 2022Updated 4 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- A Loadable Kernel Module (LKM) Rootkit that hooks the system call table and hides the chosen process(according to your parameter) from 'l…☆23Dec 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PEDA - Python Exploit Development Assistance for GDB☆66Jul 17, 2023Updated 2 years ago
- ☆42Feb 18, 2025Updated last year
- simple tester for push swap 42 project☆14Jun 20, 2022Updated 3 years ago
- tester for pipex project from 42 school☆17Jan 28, 2022Updated 4 years ago
- Some simple process injection techniques targeting the Windows platform☆32Feb 9, 2020Updated 6 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Simple x86 Trampoline Hook☆44Aug 3, 2022Updated 3 years ago
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- View handles and object for each object type☆65Sep 1, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tutorials, tools, and more as related to reverse engineering video games.☆32Sep 4, 2018Updated 7 years ago
- V7x Fishing Tool, The Most Powerful Tool For All☆105Jan 2, 2023Updated 3 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆39Jun 23, 2021Updated 4 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆117Mar 26, 2026Updated 2 weeks ago
- V7x Team (-_^)☆138Nov 24, 2023Updated 2 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆72Jan 31, 2020Updated 6 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83May 23, 2023Updated 2 years ago