A Python package for encoding, decoding and cracking the Caesar shift cipher.
☆13May 18, 2017Updated 8 years ago
Alternatives and similar repositories for Caesar-Cipher
Users that are interested in Caesar-Cipher are comparing it to the libraries listed below
Sorting:
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- This is a program that runs on a Raspberry Pi to decode ADS-B data and plot aircraft data (position, type, speed, etc).☆11Nov 9, 2018Updated 7 years ago
- An esoteric language based on overlapping tree-like structures☆10Oct 16, 2021Updated 4 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- .sub files for the LED bracelets distributed at DEFCON☆17Jul 22, 2025Updated 7 months ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Security Onion Elastic Stack☆46Feb 1, 2021Updated 5 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Web page to generate configuration files for PokemonGo-Bot☆15Oct 8, 2016Updated 9 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- From Dork to Download: Automating Google Dorks with Playwright☆41Mar 1, 2026Updated 2 weeks ago
- ☆45Aug 16, 2018Updated 7 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago