a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis
☆13Mar 16, 2025Updated last year
Alternatives and similar repositories for base-emoji
Users that are interested in base-emoji are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Aug 22, 2025Updated 8 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆80Jul 6, 2024Updated last year
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated 2 months ago
- a collection of wordlist for different projects☆13Oct 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Image Based RF Signal Identifier☆22Apr 2, 2026Updated last month
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Dumps Salesforce objects if provided with credentials.☆28Jul 31, 2025Updated 9 months ago
- Firmware for the Zaunkoenig M3K.☆15Jul 25, 2025Updated 9 months ago
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- ☆20Mar 12, 2025Updated last year
- The mainnet version of the Reserve Rights token☆18Jan 15, 2026Updated 3 months ago
- Encodes a message using emojis based on a specified pattern.☆17Feb 26, 2024Updated 2 years ago
- MS Entra ID Protection Guidance☆22Apr 2, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 months ago
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆59Nov 19, 2025Updated 5 months ago
- ☆15Mar 21, 2025Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆32May 23, 2025Updated 11 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution☆144Apr 6, 2026Updated 3 weeks ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆33Jul 31, 2024Updated last year
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- ClickForClickOnce - Generate configurable clickonce payloads☆93Apr 17, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Passive network fingerprinting and analysis engine☆123Apr 23, 2026Updated last week
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Home of https://redteam.guide☆15Apr 1, 2026Updated last month
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 9 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- ☆35Nov 11, 2025Updated 5 months ago
- Reserve Rights token and associated contracts☆19Apr 23, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆26Apr 10, 2026Updated 3 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- Cross Compatible Command and Control☆48Dec 18, 2025Updated 4 months ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago