a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis
☆13Mar 16, 2025Updated last year
Alternatives and similar repositories for base-emoji
Users that are interested in base-emoji are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Aug 22, 2025Updated 7 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆81Jul 6, 2024Updated last year
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- a collection of wordlist for different projects☆12Oct 12, 2024Updated last year
- Image Based RF Signal Identifier☆22Sep 29, 2025Updated 5 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Dumps Salesforce objects if provided with credentials.☆26Jul 31, 2025Updated 7 months ago
- Firmware for the Zaunkoenig M3K.☆14Jul 25, 2025Updated 7 months ago
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- ☆21Mar 12, 2025Updated last year
- The mainnet version of the Reserve Rights token☆17Jan 15, 2026Updated 2 months ago
- Encodes a message using emojis based on a specified pattern.☆17Feb 26, 2024Updated 2 years ago
- MS Entra ID Protection Guidance☆22Apr 2, 2024Updated last year
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆59Nov 19, 2025Updated 4 months ago
- ☆15Mar 21, 2025Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 10 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆32Jul 31, 2024Updated last year
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- ClickForClickOnce - Generate configurable clickonce payloads☆92Oct 10, 2025Updated 5 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- ☆34Nov 11, 2025Updated 4 months ago
- Reserve Rights token and associated contracts☆19Apr 23, 2021Updated 4 years ago
- ☆26Aug 5, 2025Updated 7 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year