Evolutionary encryption framework based on scalable complexity over time
☆283Sep 10, 2023Updated 2 years ago
Alternatives and similar repositories for temcrypt
Users that are interested in temcrypt are comparing it to the libraries listed below
Sorting:
- ☆18Mar 26, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆17Apr 26, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- ☆33Apr 23, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- An OSINT Framework project based on Python☆109Jun 5, 2024Updated last year
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- ☆38Feb 26, 2025Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆28Nov 8, 2022Updated 3 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 8 months ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year