An image encryption node-js cli
☆74Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for imcrypt
Users that are interested in imcrypt are comparing it to the libraries listed below
Sorting:
- Open-source antivirus project.☆31Nov 5, 2016Updated 9 years ago
- Simple node.js linux only keylogger using events☆59Apr 5, 2019Updated 6 years ago
- Web based facial Authentication system with flask server☆114Sep 21, 2022Updated 3 years ago
- Steganography app for Android☆40Apr 12, 2021Updated 4 years ago
- OWASP Password Strength Test for Node.js☆247Aug 6, 2018Updated 7 years ago
- Library for Mastercard API compliant payload encryption/decryption.☆130Mar 13, 2026Updated last week
- Basic User Authentication System from scratch using Nodejs and Express.☆55Feb 4, 2024Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- This project contains programs that will create a database of the programs installed on your PC, and match them against the NIST's CPEs (…☆24Apr 14, 2021Updated 4 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13May 22, 2023Updated 2 years ago
- CEHv12 Notes☆15Jun 11, 2023Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- ☆77Sep 27, 2024Updated last year
- SALSA 💃⚡ - SALesforce Scanner for Aura (and beyond). Enumeration of vulnerabilities and misconfigurations against Salesforce endpoint.☆29Jan 26, 2025Updated last year
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Contains all the required AWS Books, Code and materials for learning.☆19May 7, 2024Updated last year
- NetHawk 🦅: An educational PoC combining 🤖 generative AI with 🛡️ ethical hacking and 🔍 network vulnerability assessment. Simplifying s…☆38May 25, 2025Updated 9 months ago
- A new idea to build an anti ransomware☆24Oct 4, 2020Updated 5 years ago
- 隐私保护的敏感人群轨迹接触追溯算法。基于轨迹时空信息、同态加密、安全多方计算,使用Java实现☆10Oct 22, 2023Updated 2 years ago
- ☆12Feb 27, 2023Updated 3 years ago
- A collection of hacking / penetration testing resources to make you better!☆10Nov 11, 2020Updated 5 years ago
- A python tool for generating strong password☆11Nov 28, 2022Updated 3 years ago
- ☆18Jan 30, 2024Updated 2 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- Easy phishing environment builder (Red Team)☆16Nov 19, 2024Updated last year
- 🧠 A website for early detection and tracking of Alzheimer's disease using AI.☆14May 1, 2023Updated 2 years ago
- Mind-Maps of Several Things☆12Dec 22, 2021Updated 4 years ago
- ☆47Sep 9, 2023Updated 2 years ago
- A small Python script to send phishing emails from the CLI☆16Feb 27, 2018Updated 8 years ago
- bugreport☆13May 19, 2019Updated 6 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 3 years ago
- Collection of stuffs related to Information Security☆15Jul 26, 2020Updated 5 years ago
- A Great Blog Theme for Astro☆17Apr 6, 2024Updated last year