Implementation of SHA-256
☆17Jul 2, 2012Updated 13 years ago
Alternatives and similar repositories for SHA256
Users that are interested in SHA256 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C++ String-like-class that does not save data as plain-text in memory. It makes live analysis of memory more difficult, as well as fore…☆13Aug 16, 2014Updated 11 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Python implementation of MD5 and Length Extension Attack (LEA)☆10Feb 20, 2018Updated 8 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- Python package for the RC4 algorithm☆14Apr 2, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- Lightweight iterators for various sets where the elements are computed on demand.☆22Sep 25, 2016Updated 9 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Jul 19, 2017Updated 8 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 5 months ago
- Python script to extract shellcode from object/executable files☆15Nov 7, 2022Updated 3 years ago
- obuscate python source code 混淆 python 源代码的小工具☆17Sep 30, 2019Updated 6 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆22Jul 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- XSS Scan☆102Aug 10, 2013Updated 12 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆36Jun 5, 2022Updated 3 years ago
- High-assurance base64☆104Apr 6, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Feb 14, 2014Updated 12 years ago
- AV/EDR evasion via direct system calls.☆33Dec 7, 2020Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Dec 17, 2018Updated 7 years ago
- Rusty backdoor+spyware☆26Jan 20, 2021Updated 5 years ago
- Simple reverse and bind shells written in Go.☆31Sep 27, 2022Updated 3 years ago
- A Golang covert backdoor using raw sockets.☆35Feb 10, 2019Updated 7 years ago
- Identifying and Mitigating the CVE-2020–0796 flaw in the fly☆18Mar 12, 2020Updated 6 years ago
- Reverse shell using go☆38Feb 21, 2019Updated 7 years ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- ☆38Mar 3, 2025Updated last year
- Unified repository for different Metasploit Framework payloads☆48Jan 30, 2020Updated 6 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- GitHub Action for installing Sops☆51Aug 1, 2024Updated last year
- Contains some tricks to detect Sandboxes and gradually completed☆44Aug 27, 2017Updated 8 years ago
- persistent windows backdoor with reverse shell☆27May 22, 2020Updated 5 years ago