keithjjones / pycryptotools
A set of Python tools useful for cryptography and cryptanalysis.
☆15Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for pycryptotools
- Cryptanalysis and attack library☆22Updated 2 years ago
- Open YARA scan- and search engine☆17Updated 2 weeks ago
- ARP Man-in-the-Middle tool☆27Updated 2 months ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆17Updated 3 years ago
- THP Forensic Challenges☆19Updated last year
- ☆15Updated 2 years ago
- Custom exploits☆21Updated 7 months ago
- ☆30Updated 6 months ago
- DC540 hacking challenge 0x00005b.☆16Updated last year
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Upload external IP so you can find your devices elsewhere☆15Updated 7 months ago
- Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers☆30Updated 7 years ago
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆17Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆20Updated 2 years ago
- iWar - The intelligent war dialer.☆26Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆37Updated 4 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- A command line utility to interact and query the Centrifuge API.☆15Updated last year
- Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, O…☆4Updated last year
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 6 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- Data to test capa's code and rules.☆39Updated last week
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆11Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆10Updated last year
- bettercap official documentation and website contents☆34Updated 2 months ago
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago