keybase / python-salsa20
Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein
☆32Updated 4 years ago
Related projects: ⓘ
- Decoders for 7ev3n ransomware☆14Updated 7 years ago
- python tor client☆26Updated 9 years ago
- ☆10Updated this week
- ☆15Updated 7 years ago
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 8 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Updated 8 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 6 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Updated 4 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆16Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Secure SSH server using onion service.☆18Updated 7 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- ☆11Updated this week
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆10Updated 10 years ago
- ☆32Updated this week
- A Python / Scapy implementation of the OR (TOR) protocol.☆95Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Scan binaries for encryption algorithms/file systems/..☆15Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 6 years ago