Learn basic crypto in 2 hours
☆16Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for 2hourscrypto
Users that are interested in 2hourscrypto are comparing it to the libraries listed below
Sorting:
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- ☆22May 20, 2016Updated 9 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- A multithreaded league of legends ping checker. Free download -☆13Jan 8, 2019Updated 7 years ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Mar 6, 2019Updated 7 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Cheatsheets on security vulnerabilities and exploits.☆35Jan 20, 2020Updated 6 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆43Apr 18, 2021Updated 4 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- WAyereless Site SUrveying Program☆12Feb 9, 2016Updated 10 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Auto connect and reconnect to Mikrotik free WiFi point on DD-WRT router☆12Dec 2, 2016Updated 9 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago