kirei / python-base45
Base45
☆22Updated 11 months ago
Alternatives and similar repositories for python-base45:
Users that are interested in python-base45 are comparing it to the libraries listed below
- Android App that genereates passcode authentication codes for Postfinance cards☆10Updated 3 years ago
- Python CLI and module for CIRCL hash lookup☆12Updated last month
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆12Updated 7 months ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆22Updated 2 months ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated last year
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆16Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- A python RCE exploit on QNAP-QTS☆13Updated 4 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 9 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- ☆4Updated 2 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆18Updated last year
- Data EXfiltration TestER☆21Updated 5 years ago
- A file-sharing app providing end-to-end encryption of data.☆36Updated 3 months ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- A map of the botnet attacking our server☆14Updated 7 years ago