Mahmoud7Osman / AixCryptLinks
A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm
☆23Updated 3 years ago
Alternatives and similar repositories for AixCrypt
Users that are interested in AixCrypt are comparing it to the libraries listed below
Sorting:
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆43Updated 3 years ago
- Golang malware development library☆19Updated 3 years ago
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆22Updated 3 years ago
- Input/Output Assembly Header coded by me.☆10Updated 2 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆53Updated 3 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆108Updated 2 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆81Updated last year
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆68Updated 3 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆20Updated 2 years ago
- Simple Assault cube external hack written in C☆13Updated 4 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆60Updated 4 years ago
- Malware Development☆11Updated 5 years ago
- 「💽」MBR Overwrite malware for linux☆27Updated 11 months ago
- this used to be a private virus but i have it so now its not☆11Updated 4 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆13Updated 3 years ago
- GDI malware☆10Updated 4 years ago
- Source code of TrojanXD☆14Updated 3 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 5 months ago
- This virus can destroy your computer :-)☆29Updated 4 years ago
- A simple script to overwrite the MBR (Master Boot Record) using the Python coding language. This is only for educational purposes only, a…☆16Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆80Updated last year
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Updated 4 years ago
- a "process-less" trojan☆12Updated 5 years ago
- Remote Access Trojan collection.(260+ RAT-Builders!)☆264Updated 3 years ago
- ☆16Updated 2 years ago
- a simple C++ tool using the windows registry to disable windows defender☆13Updated 4 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆21Updated 3 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Updated 8 years ago
- Advanced Keylogger / Info Grabber written in C++.☆33Updated 7 months ago