brandis-project / brandisView external linksLinks
Brandis: End-to-end encryption for everyone
☆79Jul 22, 2017Updated 8 years ago
Alternatives and similar repositories for brandis
Users that are interested in brandis are comparing it to the libraries listed below
Sorting:
- My bash Tips and Tricks to build interactive shell scripts☆10Feb 19, 2016Updated 9 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Name generator as a service☆10Aug 22, 2018Updated 7 years ago
- A node.js setup to demonstrate FIDO Universal 2nd Factor (U2F) authentication☆12Oct 23, 2021Updated 4 years ago
- RactiveJS components & AmpersandJS models☆12Sep 25, 2015Updated 10 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- An RFC 4326 interface for GNU Radio☆15Sep 8, 2025Updated 5 months ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 9 years ago
- synckeys a simple tool to manage ssh keys of multiple people spread on multiple servers☆18Dec 13, 2021Updated 4 years ago
- Google Chrome internals analysis using Volatility☆42Nov 17, 2022Updated 3 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- An U2F Token implementation based on JavaCard☆15Mar 5, 2016Updated 9 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Mar 7, 2022Updated 3 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- Simple one-time note service☆17Dec 18, 2022Updated 3 years ago
- Enables ICU message formatting for translations in Symfony applications.☆27Aug 27, 2024Updated last year
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Aug 14, 2023Updated 2 years ago
- Command based translation workflow between Crowdin and Github☆21Nov 13, 2024Updated last year
- Volatility plugin to extract FileVault 2 VMK's☆51Sep 20, 2021Updated 4 years ago
- A python script used to parse the SAM registry hive.☆76Jan 26, 2018Updated 8 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- A Kibana plugin to explore Elasticsearch Topology☆17Dec 9, 2016Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Sample FIDO 2.0 BLE Authenticator☆21Oct 12, 2017Updated 8 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago