A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitute for real cryptography.
☆24May 30, 2018Updated 7 years ago
Alternatives and similar repositories for crypto-tools
Users that are interested in crypto-tools are comparing it to the libraries listed below
Sorting:
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- A tool to tunnel TCP traffic over WinRM☆18Jul 15, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Experiment on reproducing Obfuscate & Sleep☆162Mar 14, 2021Updated 4 years ago
- Kerberos TGS_REP cracker written in Golang☆57Nov 18, 2015Updated 10 years ago
- Scapy Penetration testing scripts☆21May 26, 2015Updated 10 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 weeks ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Mar 3, 2020Updated 5 years ago
- Write your own exploit for $CASH☆26Jun 16, 2022Updated 3 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆146May 1, 2021Updated 4 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- ☆32Oct 13, 2025Updated 4 months ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆35Feb 1, 2021Updated 5 years ago
- Parse SDDL strings☆37Apr 1, 2024Updated last year
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Jan 29, 2021Updated 5 years ago
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- ☆41Apr 5, 2025Updated 10 months ago
- WebGL fuzzer☆39Mar 13, 2023Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Nov 10, 2025Updated 3 months ago
- Scripts that we use for pentesting☆42Feb 24, 2017Updated 9 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year