Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency
☆12Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for cryptomnesia
Users that are interested in cryptomnesia are comparing it to the libraries listed below
Sorting:
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- Metasploit's native payload for Mac OS X and iOS☆21Jun 30, 2014Updated 11 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- A Crawler That Crawls Email Addresses From Various Sources! Ex: pastebin, github, paste ubuntu e.t.c☆11Sep 10, 2018Updated 7 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- My personal tech blog☆16Dec 13, 2024Updated last year
- ☆14Jun 7, 2017Updated 8 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- Malware & URL Scanner - A Chrome extension to lookup a Potentially Malicious Websites.☆13May 27, 2021Updated 4 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.☆16Jul 29, 2016Updated 9 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- ☆17Feb 5, 2018Updated 8 years ago
- Bypass AMSI and Defender using Ordinal Values☆41Apr 15, 2020Updated 5 years ago
- A malicious access point that injects mining scripts on the fly.☆16Dec 7, 2020Updated 5 years ago
- Android-Anti-AntiTrace☆11Jun 11, 2019Updated 6 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- Collect user inputs using modal pop-up boxes☆13Aug 3, 2022Updated 3 years ago
- Framework for creating fuzzers and negative tests for TLS 1.3 implementations☆13Mar 21, 2024Updated last year
- ☆12May 6, 2019Updated 6 years ago
- Some helpful things for AVR☆16Jan 23, 2018Updated 8 years ago
- A suite of tools to assist with reviewing Open Source Software dependencies.☆13Mar 12, 2026Updated last week
- ☆25Jul 5, 2018Updated 7 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ZIP 💣 httpd. Just a gift for scanners and bots.☆21Jul 13, 2017Updated 8 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- UEFI keylogger prototype☆10May 10, 2017Updated 8 years ago
- ☆13Apr 8, 2019Updated 6 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- A golang IRC bot☆13Oct 11, 2023Updated 2 years ago
- Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploi…☆17Dec 8, 2015Updated 10 years ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Jan 14, 2026Updated 2 months ago
- ☆11Feb 21, 2012Updated 14 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago