RobSpectre / Caesar-CipherLinks
A Python package for encoding, decoding and cracking the Caesar shift cipher.
☆13Updated 8 years ago
Alternatives and similar repositories for Caesar-Cipher
Users that are interested in Caesar-Cipher are comparing it to the libraries listed below
Sorting:
- LIFARS Networking Security GNU/Linux distro☆27Updated 7 years ago
- A simple capture the flag framework.☆125Updated 8 years ago
- Fetch, install and search exploit archives from exploit sites.☆118Updated 2 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Updated 9 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- Development guide for Volatility Plugins☆22Updated 8 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆160Updated 5 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 6 years ago
- ☆93Updated 7 years ago
- The User Interface for GoCrack☆88Updated last week
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- a fully python Diffie-Hellman Library☆52Updated 7 years ago
- _Working_ examples from Grayhat Python☆14Updated 10 years ago
- Malquarium - Modern Malware Repository☆47Updated this week
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆83Updated 3 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆143Updated last month
- ☆28Updated 7 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago
- Shell-style script to search exploit-db.com exploits.☆61Updated last year
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- zsh plugin for metasploit framework☆14Updated 8 years ago
- ☆24Updated 6 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Automated install scripts for Cuckoo sandbox☆38Updated 8 years ago
- Writeup oriented CTF☆22Updated 8 years ago
- The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defin…☆56Updated 4 years ago