A Python package for encoding, decoding and cracking the Caesar shift cipher.
☆13May 18, 2017Updated 8 years ago
Alternatives and similar repositories for Caesar-Cipher
Users that are interested in Caesar-Cipher are comparing it to the libraries listed below
Sorting:
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- DHCP Leases widget for pfSense☆11Nov 23, 2017Updated 8 years ago
- This is a program that runs on a Raspberry Pi to decode ADS-B data and plot aircraft data (position, type, speed, etc).☆11Nov 9, 2018Updated 7 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Find social media accounts by username. Fast.☆10Jan 12, 2026Updated last month
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Automatic DNS Enumeration Tool with various functions☆13Sep 28, 2021Updated 4 years ago
- Introducing SQLMAP into non-HTTP services.☆13Oct 24, 2019Updated 6 years ago
- Official hardware design files for blink(1) mk3 USB RGB LED by ThingM☆13May 9, 2021Updated 4 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago