cryptolok / DeCryKeLinks
DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (aka Yarovaya law) and its FSB implementation.
☆23Updated 7 years ago
Alternatives and similar repositories for DeCryKe
Users that are interested in DeCryKe are comparing it to the libraries listed below
Sorting:
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- ☆15Updated 8 years ago
- See here:☆42Updated 12 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- ☆12Updated 8 years ago
- ☆44Updated 2 weeks ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago