jbremer / rc4Links
Python package for the RC4 algorithm
☆14Updated 8 years ago
Alternatives and similar repositories for rc4
Users that are interested in rc4 are comparing it to the libraries listed below
Sorting:
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Simple unpacking script for Ezuri ELF Crypter☆35Updated 3 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- ☆8Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆54Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- ☆24Updated 4 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- ☆24Updated 5 years ago
- ☆16Updated 11 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Simple DLL to test various injection methods.☆51Updated 4 years ago
- ☆17Updated 6 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- A Python Obfuscator through AST modification☆23Updated 5 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆13Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- ☆22Updated 4 years ago