A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitute for real cryptography.
☆24May 30, 2018Updated 7 years ago
Alternatives and similar repositories for crypto-tools
Users that are interested in crypto-tools are comparing it to the libraries listed below
Sorting:
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated last month
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- ☆11Apr 23, 2019Updated 6 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- A Nmap script optimized for Hack the Box and CTFs☆14Feb 22, 2021Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Experiment on reproducing Obfuscate & Sleep☆163Mar 14, 2021Updated 5 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Mar 3, 2020Updated 6 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Jan 19, 2021Updated 5 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- POC for GitLabs Authenticated RCE in version 11.4.7 community edition☆13Feb 8, 2021Updated 5 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆47Oct 9, 2022Updated 3 years ago
- Kerberos TGS_REP cracker written in Golang☆57Nov 18, 2015Updated 10 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Apr 14, 2021Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Nov 22, 2019Updated 6 years ago