dannagle / CryptoknifeLinks
All-in-one, portable, collection of general-purpose cryptography tools
☆48Updated 6 years ago
Alternatives and similar repositories for Cryptoknife
Users that are interested in Cryptoknife are comparing it to the libraries listed below
Sorting:
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆63Updated 14 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- ☆21Updated 8 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Updated 9 years ago
- DiskCryptor - Open source partition encryption solution☆42Updated 11 years ago
- anti-virtualmachine with C!☆23Updated 9 years ago
- Application for random attack on Green Petya's key☆25Updated 8 years ago
- An encryptor/compressor for PE executables☆20Updated 2 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- ☆19Updated 8 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Updated 3 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Updated 10 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- ☆11Updated 10 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Updated 5 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆48Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago