Mahmoud7Osman / AixCryptLinks
A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm
☆23Updated 3 years ago
Alternatives and similar repositories for AixCrypt
Users that are interested in AixCrypt are comparing it to the libraries listed below
Sorting:
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆21Updated 3 years ago
- Golang malware development library☆19Updated 3 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆43Updated 3 years ago
- Input/Output Assembly Header coded by me.☆10Updated last year
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆108Updated 2 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆53Updated 3 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆82Updated last year
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆63Updated 3 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆20Updated last year
- ☆12Updated 3 years ago
- Simple Assault cube external hack written in C☆13Updated 4 years ago
- This virus can destroy your computer :-)☆28Updated 4 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆59Updated 3 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆59Updated 4 months ago
- 「💽」MBR Overwrite malware for linux☆26Updated 9 months ago
- A builder for BatchStealer☆21Updated 3 years ago
- a simple C++ tool using the windows registry to disable windows defender☆14Updated 4 years ago
- GDI malware☆11Updated 4 years ago
- a "process-less" trojan☆12Updated 5 years ago
- this used to be a private virus but i have it so now its not☆11Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated last year
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Updated 4 years ago
- Advanced Keylogger / Info Grabber written in C++.☆33Updated 6 months ago
- Activation For Burpsuite Professional By UNCIA☆19Updated 3 years ago
- A recode of the open source ransomware "Hidden Tear", this has fixes for all of the old hidden tear problems and has a bit cleaner code☆13Updated last year
- Source code of TrojanXD☆14Updated 3 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆13Updated 3 years ago
- A simple script to overwrite the MBR (Master Boot Record) using the Python coding language. This is only for educational purposes only, a…☆16Updated 3 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated last year
- Complete Python RansomeWare Source Code With Full Decoumetions.☆219Updated 2 years ago