laconicwolf / crypto-toolsLinks
A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitute for real cryptography.
☆24Updated 7 years ago
Alternatives and similar repositories for crypto-tools
Users that are interested in crypto-tools are comparing it to the libraries listed below
Sorting:
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- ☆36Updated 7 years ago
- ☆51Updated 5 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- Walking the PEB in VBA☆24Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- ☆15Updated 4 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆48Updated 5 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago