bitbeans / ransodiumLinks
like hidden-tear with libsodium
☆21Updated 10 years ago
Alternatives and similar repositories for ransodium
Users that are interested in ransodium are comparing it to the libraries listed below
Sorting:
- Platform for Browser Exploitation☆34Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- ☆10Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 9 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 5 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 7 years ago
- WeakNet PHP Execution Shell☆31Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- ☆16Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 9 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 11 years ago
- ☆12Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago
- ☆13Updated 9 years ago
- ☆17Updated 11 years ago