karthikuj / 7uring
An advanced cryptography tool for hashing, encrypting, encoding, steganography and more.
☆17Updated 3 years ago
Alternatives and similar repositories for 7uring:
Users that are interested in 7uring are comparing it to the libraries listed below
- ☆16Updated 2 years ago
- Keylogger for Linux made in Python☆6Updated 2 years ago
- ☆50Updated last year
- Things we learned from Capture The Flag hacking competitions we participated in☆17Updated 3 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆154Updated last year
- Cyber Security Foundations☆35Updated 3 years ago
- Website that lets you:- • Generate strong new passwords • Check the strength of your password and • Find the time it would take a hacker …☆11Updated 2 years ago
- Writeups Of CTFlearn Challenges☆16Updated 11 months ago
- Projects that show my knowledge and experience of Cyber Security.☆15Updated 2 years ago
- Mutant is an open-source, garbage-collected programming language that tries to enable security by default.☆54Updated 3 months ago
- Writeups of VishwaCTF 2022 of some challenges solved by our team☆8Updated 2 years ago
- Github Repository for Writeups of vishwaCTF'21 Challenges☆10Updated 3 years ago
- ☆68Updated 3 months ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆75Updated 4 years ago
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆10Updated 6 years ago
- Projects related to Information security/Cyber security/Cryptography☆29Updated last year
- CScorza Web - Insieme di tutti gli strumenti OSINT e Digital Forensics☆19Updated last month
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- ☆12Updated 4 years ago
- A tool that detects maliciousness of suspicious links, written in python with <3.☆15Updated 2 years ago
- This Repo will help you to prepare better for CEH - Practical Exam☆49Updated 10 months ago
- ☆56Updated 3 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆27Updated 8 months ago
- ☆138Updated last year
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆14Updated last year
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆46Updated last year
- Simple Malware Scanner written in python☆90Updated last year
- Writeups of CTFLearn Challenges , by EdbR - EladBeber☆13Updated 4 years ago
- Image-Steganography-LSB is a command-line application that enables users to perform steganography using the Least Significant Bit (LSB) a…☆17Updated 11 months ago
- ☆14Updated last year