A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm
☆23Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for AixCrypt
Users that are interested in AixCrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang malware development library☆19Dec 14, 2021Updated 4 years ago
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆23Dec 30, 2021Updated 4 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆42Nov 12, 2021Updated 4 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆53Dec 22, 2021Updated 4 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆109Dec 30, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Input/Output Assembly Header coded by me.☆10Sep 30, 2023Updated 2 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆22Oct 2, 2023Updated 2 years ago
- Moverse's Official Website☆10Mar 14, 2022Updated 4 years ago
- Activation For Burpsuite Professional By UNCIA☆28Jun 18, 2022Updated 3 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 5 years ago
- my .vimrc in ubuntu☆14May 2, 2016Updated 9 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- external hack for Among Us (PATCHED)☆37Aug 8, 2021Updated 4 years ago
- Automatically create an fake account and star a repository.☆16Jun 2, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All about gaining Power, Influence and Control, manipulation, deception and more...☆19May 8, 2024Updated last year
- A Bot to Boost your Views on YouTube made in Python☆14Jan 20, 2023Updated 3 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆61Oct 27, 2021Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- A tool that performs HULK HTTP flood, Ping of Death, UDP flood, SNMP, Smurf ICMP, and Slowloris attacs☆26Nov 23, 2021Updated 4 years ago
- High-speed lossless data compression of 16 to 512 bytes--get better average compression than QuickLZ for 512-byte blocks. td512 maintains…☆27Feb 14, 2022Updated 4 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- A Loadable Kernel Module (LKM) Rootkit that hooks the system call table and hides the chosen process(according to your parameter) from 'l…☆23Dec 24, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PEDA - Python Exploit Development Assistance for GDB☆66Jul 17, 2023Updated 2 years ago
- ☆43Feb 18, 2025Updated last year
- simple tester for push swap 42 project☆14Jun 20, 2022Updated 3 years ago
- tester for pipex project from 42 school☆17Jan 28, 2022Updated 4 years ago
- Some simple process injection techniques targeting the Windows platform☆32Feb 9, 2020Updated 6 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Sep 28, 2024Updated last year
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- Simple x86 Trampoline Hook☆44Aug 3, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- Tutorials, tools, and more as related to reverse engineering video games.☆33Sep 4, 2018Updated 7 years ago
- View handles and object for each object type☆67Sep 1, 2019Updated 6 years ago
- V7x Fishing Tool, The Most Powerful Tool For All☆105Jan 2, 2023Updated 3 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆40Jun 23, 2021Updated 4 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆72Jan 31, 2020Updated 6 years ago
- Simulate per-process disconnection in red team environments☆113Jun 6, 2025Updated 10 months ago