keithjjones / pycryptotools
A set of Python tools useful for cryptography and cryptanalysis.
☆15Updated 8 years ago
Alternatives and similar repositories for pycryptotools:
Users that are interested in pycryptotools are comparing it to the libraries listed below
- Cryptanalysis and attack library☆22Updated 2 years ago
- Open YARA scan- and search engine☆19Updated 2 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- ARP Man-in-the-Middle tool☆28Updated 2 months ago
- Upload external IP so you can find your devices elsewhere☆15Updated 10 months ago
- ☆13Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Launch radare2 like a boss from pwntools in tmux☆22Updated 5 years ago
- Custom exploits☆24Updated 10 months ago
- Disassembly Generation and Processing for JARV1S☆13Updated 6 months ago
- Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers☆30Updated 7 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- ☆16Updated 3 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆10Updated 10 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆18Updated 5 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- ☆22Updated 4 years ago
- Read only mirror - No pull requests☆20Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- THP Forensic Challenges☆21Updated last year
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆17Updated 2 years ago
- Format string exploit generation☆10Updated 9 years ago