Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.
☆180Dec 28, 2015Updated 10 years ago
Alternatives and similar repositories for demoncrypt
Users that are interested in demoncrypt are comparing it to the libraries listed below
Sorting:
- Public File Sharing Network for Demonsaw☆17Nov 25, 2016Updated 9 years ago
- Demonsaw Source Code☆122Oct 26, 2021Updated 4 years ago
- Guides and support for communicating in private.☆19Feb 12, 2019Updated 7 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Viewer for Observing Multiple Computers using VNC☆18Feb 13, 2010Updated 16 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- A browser for the SAFE Network☆20Jan 1, 2022Updated 4 years ago
- Chrome extension for Discourse communities notifications☆13Jan 21, 2017Updated 9 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- googleusercontent.com as HTTP(S) proxy☆54Sep 12, 2020Updated 5 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 12 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- [DEPRECATED] Old RS website☆49Aug 31, 2021Updated 4 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Generative models and other stuff too, maybe, perhaps even probably☆16Dec 12, 2015Updated 10 years ago
- DEPRECATED, see i2p/i2p.i2p-bote☆19May 10, 2025Updated 9 months ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Python OSINT Tool to retrieve information from Skype☆76Oct 12, 2015Updated 10 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Low level storj protocol reference implementation.☆15Mar 8, 2016Updated 9 years ago
- Easy-as RPC. Zero-server RPC for Python and Java.☆44Aug 23, 2016Updated 9 years ago
- Node.js App for SAFE Launcher☆95Mar 20, 2019Updated 6 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- INDX Server☆42Feb 17, 2015Updated 11 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Aug 26, 2015Updated 10 years ago
- Gandr is a cross-platform bootloader project, intended to fill in the gap of a utopic bootloader.☆20Aug 13, 2015Updated 10 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Aug 9, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Jul 4, 2013Updated 12 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- A bookmarklet that shows the ordering on the directed edges of your facebook friends☆30Mar 28, 2013Updated 12 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago