awgh / bencryptLinks
Encryption Abstraction Layer and Utilities for ratnet
☆18Updated last year
Alternatives and similar repositories for bencrypt
Users that are interested in bencrypt are comparing it to the libraries listed below
Sorting:
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- ☆33Updated 4 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆100Updated 2 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- DNS server for pentesters☆49Updated 3 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- Shellcode process injector☆28Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- A logging ASKPASS binary☆29Updated 5 years ago
- Network Finger Printer☆16Updated 7 years ago
- Provides access to libhashcat☆30Updated last year
- ☆16Updated 5 years ago
- ☆44Updated 7 years ago
- Reverse shell using go☆38Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Updated 2 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Updated 6 years ago
- Keyhack - Golang API token/webhook validator☆17Updated 4 months ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago