Mahmoud7Osman / AixCrypt
A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm
☆23Updated 3 years ago
Alternatives and similar repositories for AixCrypt:
Users that are interested in AixCrypt are comparing it to the libraries listed below
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆21Updated 3 years ago
- Golang malware development library☆19Updated 3 years ago
- Moverse's Official Website☆9Updated 3 years ago
- Simple Port Scanner coded by me,using C++ and socket API.☆7Updated 3 years ago
- Input/Output Assembly Header coded by me.☆10Updated last year
- ☆6Updated 3 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆43Updated 3 years ago
- XSSLab is vulnerable 'xss' website That can help you to improve your hacking and bug hunting skills.☆7Updated last year
- Open source Linux chatting software, works on all linux distros.☆8Updated last year
- By this Simple WebShell you can exploit File Upload vulnerability and execute command in the vulnerable web server.☆3Updated 3 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆51Updated 3 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆110Updated 2 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆20Updated last year
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆84Updated last year
- Activation For Burpsuite Professional By UNCIA☆12Updated 2 years ago
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆42Updated 3 years ago
- Simple Assault cube external hack written in C☆13Updated 3 years ago
- external hack for Among Us (PATCHED)☆37Updated 3 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆60Updated 3 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆12Updated 3 months ago
- Automatically create an fake account and star a repository.☆15Updated 6 years ago
- anonymous spam E-mail sender☆22Updated 3 years ago
- Rat forked from https://github.com/quasar/QuasarRAT. New functionalities added.☆10Updated 8 years ago
- Amazing CryptoWAF was a CTF challenge for ALLES! CTF 2021☆34Updated 3 years ago
- Python steal chrome password all version browser are supported 100 % FUD☆285Updated 4 years ago
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder☆255Updated 2 years ago
- A crypter/dropper to bypass static (and dynamic) analysis.☆14Updated 2 years ago
- "TheJudgment," a captivating steganography challenge that will test your skills in uncovering hidden messages. Immerse yourself in a worl…☆17Updated 10 months ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆217Updated 2 years ago
- This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linea…☆23Updated 8 months ago