cryptolok / DeCryKe
DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (aka Yarovaya law) and its FSB implementation.
☆23Updated 7 years ago
Alternatives and similar repositories for DeCryKe:
Users that are interested in DeCryKe are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- See here:☆42Updated 12 years ago
- ☆11Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆52Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆44Updated last month
- Popping boxes with Nmap☆18Updated 12 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆31Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago