Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency
☆15Nov 13, 2025Updated 3 months ago
Alternatives and similar repositories for nakamoto
Users that are interested in nakamoto are comparing it to the libraries listed below
Sorting:
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 3 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 6 months ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 9 months ago
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- ☆49Dec 20, 2025Updated 2 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Feb 23, 2026Updated last week
- NextPGP is a elegant and powerful, modern online PGP tool built with Next.js. It can generate keys, manage keyrings, encrypt and decrypt …☆27Feb 7, 2026Updated 3 weeks ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- ☆39Jul 31, 2025Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 11 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Aug 5, 2025Updated 6 months ago
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 2 months ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆74Updated this week
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated 2 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago
- ☆10Jun 25, 2025Updated 8 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- ☆55Nov 4, 2025Updated 3 months ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆121Jan 30, 2026Updated last month
- ☆154Dec 19, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ☆13Apr 12, 2019Updated 6 years ago
- ☆163Nov 19, 2025Updated 3 months ago
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows☆34Jan 27, 2026Updated last month
- Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust☆153Updated this week
- ReARM - Release-Level Supply Chain Evidence Platform. SBOMs, xBOMs and every other artifact - stored for 10+ years, versioned and audit-r…☆91Updated this week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆54Mar 8, 2025Updated 11 months ago