grugq / quotes
quotes i like.
☆14Updated 5 years ago
Alternatives and similar repositories for quotes:
Users that are interested in quotes are comparing it to the libraries listed below
- suspect is a simple bash triage tool☆18Updated 6 years ago
- E4's C2 server☆20Updated 4 years ago
- ☆13Updated 4 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Geolocate your files!☆16Updated 3 years ago
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ☆15Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- ☆26Updated 7 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- ☆36Updated 5 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- ☆25Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- ☆10Updated 10 years ago
- ☆28Updated 4 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago