blackmassgroup / exchange
A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file hashes with Erlang crypto library and uses Oban for all most API requests for automated retries.Has CI/CD setup and is deployed on Fly.io.
☆84Updated this week
Alternatives and similar repositories for exchange:
Users that are interested in exchange are comparing it to the libraries listed below
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated last year
- Free training course offered at Hack Space Con 2023☆137Updated last year
- A repository of credential stealer formats☆199Updated last month
- ☆274Updated last year
- ☆133Updated last year
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 9 months ago
- ☆36Updated 2 months ago
- Configuration Extractors for Malware☆91Updated last month
- A ProcessMonitor visualization application written in rust.☆179Updated last year
- ☆84Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆143Updated 4 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆92Updated last year
- Advanced Email Threat Hunting w/ Detection as Code☆51Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Just some lists of Malware Configs☆168Updated 2 months ago
- The most average C2 ever (MACE)☆96Updated 2 years ago
- ☆186Updated last year
- ☆64Updated last month
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 7 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆180Updated 3 weeks ago
- ☆66Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆127Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- A comprehensive Hypervisor resources repo☆101Updated last month