awgh / bencryptLinks
Encryption Abstraction Layer and Utilities for ratnet
☆18Updated last year
Alternatives and similar repositories for bencrypt
Users that are interested in bencrypt are comparing it to the libraries listed below
Sorting:
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- ☆33Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆101Updated this week
- DNS server for pentesters☆50Updated last week
- ☆16Updated 5 years ago
- A logging ASKPASS binary☆29Updated 5 years ago
- Network Finger Printer☆16Updated 8 years ago
- Provides access to libhashcat☆31Updated last year
- Shellcode process injector☆28Updated 5 years ago
- Reverse shell using go☆38Updated 6 years ago
- ☆42Updated 7 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 8 years ago
- Keyhack - Golang API token/webhook validator☆17Updated 7 months ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- A repo full of example gscripts☆101Updated 6 years ago
- Shellcode library as a Go package☆70Updated 6 years ago
- Cross-platform proxy selection with optional native authentication negotiation☆52Updated 2 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Hiding implants in HTML files☆65Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago