laconicwolf / crypto-tools
A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitute for real cryptography.
☆23Updated 6 years ago
Alternatives and similar repositories for crypto-tools:
Users that are interested in crypto-tools are comparing it to the libraries listed below
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- pypykatz plugin for volatility3 framework☆39Updated 11 months ago
- ☆36Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆20Updated 5 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 5 years ago
- F# Implementation to spawn shellcode☆46Updated 6 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆60Updated 6 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- extracts shellcode from a nasm compile macho binary☆17Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- Red Team Automation tool powered by go and terraform☆28Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- ☆36Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 6 months ago
- ☆39Updated 6 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆58Updated 5 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆24Updated 2 years ago
- ☆9Updated 8 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- ☆46Updated 4 years ago
- AMSI detection PoC☆31Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆36Updated 5 years ago
- named pipe server with impersonation☆58Updated 5 years ago