cryptolok / DeCryKe
DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (aka Yarovaya law) and its FSB implementation.
☆23Updated 7 years ago
Alternatives and similar repositories for DeCryKe:
Users that are interested in DeCryKe are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- See here:☆42Updated 12 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ArchPwn security linux live project☆19Updated 14 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- ☆12Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 10 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- ssh session type for metasploit☆98Updated 2 years ago