gentilkiwi / curveball
CVE-2020-0601 #curveball - Alternative Key Calculator
☆75Updated 4 years ago
Related projects: ⓘ
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆15Updated 3 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- Various techniques for exploiting Windows☆10Updated 11 months ago
- Public exploits☆15Updated 6 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated last week
- Developper-proof prevention of SQL injection (java library)☆10Updated 3 years ago
- ☆17Updated last year
- Alienvault Labs Projects Random Stuff☆16Updated 11 years ago
- The pattern matching swiss knife☆14Updated 4 years ago
- ☆19Updated this week
- ☆12Updated this week
- Open YARA scan- and search engine☆15Updated last year
- ☆23Updated this week
- Go wrapper for awslabs/certlint☆24Updated 4 years ago
- ☆71Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Updated 3 years ago
- Conquer the deep ocean, host an .onion site fast!☆14Updated last year
- C# SDK for SecureAuth IdP API☆11Updated last year
- Test Suite for John the Ripper☆24Updated 2 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 8 years ago
- Fish shell plugin to extract (almost) any kind of archives☆10Updated 8 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆18Updated 6 months ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- Graphing package for mapping and visualizing the Internet☆18Updated 8 months ago
- Identifies Bluetooth Low-energy devices☆15Updated 4 years ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆17Updated 2 years ago