cryptolok / DeCryKe
DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (aka Yarovaya law) and its FSB implementation.
☆23Updated 7 years ago
Alternatives and similar repositories for DeCryKe:
Users that are interested in DeCryKe are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- See here:☆42Updated 12 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 5 years ago
- ArchPwn security linux live project☆19Updated 14 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- ☆11Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 7 years ago