cryptolok / DeCryKeLinks
DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (aka Yarovaya law) and its FSB implementation.
☆23Updated 7 years ago
Alternatives and similar repositories for DeCryKe
Users that are interested in DeCryKe are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- See here:☆42Updated 12 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 2 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Password cracking utility☆53Updated 4 years ago
- Easy Window domain access☆51Updated 11 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago