laconicwolf / crypto-toolsLinks
A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitute for real cryptography.
☆24Updated 7 years ago
Alternatives and similar repositories for crypto-tools
Users that are interested in crypto-tools are comparing it to the libraries listed below
Sorting:
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆36Updated 7 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆47Updated 2 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Updated 5 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Updated 2 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 5 years ago
- Offensive go lang series☆35Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- ☆28Updated 6 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- ☆52Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- Milw0rm website's mirror ! For old time's sake !☆51Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago