lrusso96 / CryptographyLinks
Utils for Cryptography class (1047622)
☆13Updated 2 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- Damn Vulnerable ElectronJS App (DVEA)☆14Updated 6 months ago
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Unicode Security Toolkit☆35Updated 8 months ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 2 months ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- ☆12Updated 2 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- ☆29Updated 2 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆16Updated last year
- Notes for the Cryptography course at Sapienza☆11Updated 4 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆17Updated 3 years ago
- Static analysis of wordpress plugins☆62Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 7 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 3 months ago
- Just another vulnerable web application.☆36Updated 10 months ago