A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm
☆23Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for AixCrypt
Users that are interested in AixCrypt are comparing it to the libraries listed below
Sorting:
- Golang malware development library☆19Dec 14, 2021Updated 4 years ago
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆22Dec 30, 2021Updated 4 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆42Nov 12, 2021Updated 4 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆53Dec 22, 2021Updated 4 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆79Mar 15, 2024Updated 2 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆108Dec 30, 2022Updated 3 years ago
- Input/Output Assembly Header coded by me.☆10Sep 30, 2023Updated 2 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆22Oct 2, 2023Updated 2 years ago
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆81Apr 7, 2022Updated 3 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 4 years ago
- my .vimrc in ubuntu☆14May 2, 2016Updated 9 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- external hack for Among Us (PATCHED)☆37Aug 8, 2021Updated 4 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆61Oct 27, 2021Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- V7x Fishing Tool☆45Mar 3, 2024Updated 2 years ago
- High-speed lossless data compression of 16 to 512 bytes--get better average compression than QuickLZ for 512-byte blocks. td512 maintains…☆27Feb 14, 2022Updated 4 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- A Loadable Kernel Module (LKM) Rootkit that hooks the system call table and hides the chosen process(according to your parameter) from 'l…☆23Dec 24, 2019Updated 6 years ago
- PEDA - Python Exploit Development Assistance for GDB☆66Jul 17, 2023Updated 2 years ago
- ☆42Feb 18, 2025Updated last year
- simple tester for push swap 42 project☆14Jun 20, 2022Updated 3 years ago
- tester for pipex project from 42 school☆17Jan 28, 2022Updated 4 years ago
- Some simple process injection techniques targeting the Windows platform☆32Feb 9, 2020Updated 6 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Sep 28, 2024Updated last year
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- Simple x86 Trampoline Hook☆44Aug 3, 2022Updated 3 years ago
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- V7x Fishing Tool, The Most Powerful Tool For All☆105Jan 2, 2023Updated 3 years ago
- View handles and object for each object type☆65Sep 1, 2019Updated 6 years ago
- Tutorials, tools, and more as related to reverse engineering video games.☆32Sep 4, 2018Updated 7 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆39Jun 23, 2021Updated 4 years ago
- V7x Team (-_^)☆138Nov 24, 2023Updated 2 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆71Jan 31, 2020Updated 6 years ago
- Simulate per-process disconnection in red team environments☆112Jun 6, 2025Updated 9 months ago