lukaszbanasiak / python-ciphers
Simple ciphers implementation in Python. AtBash, Bacon, Bifid, Caesar, Polybius.
☆21Updated 10 years ago
Alternatives and similar repositories for python-ciphers
Users that are interested in python-ciphers are comparing it to the libraries listed below
Sorting:
- A collection of shellcodes☆68Updated 13 years ago
- For BurpSuite Plugins☆11Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- A python implementation of the block cipher RC4☆41Updated 7 years ago
- ☆36Updated 12 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆127Updated 11 years ago
- ☆9Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- python based backdoor software☆17Updated 13 years ago
- Patch pyc files with your code. Fairly lame.☆68Updated 9 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- Automatic detection of hashing algorithms☆20Updated 8 years ago
- Python Application to Reverse Freezing☆36Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Updated 3 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆20Updated last year
- Github Desktop RCE PoC☆28Updated 6 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- ARP ping detector on local network☆15Updated 12 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Attack-Defend CTF Tools☆23Updated 8 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- CMS Exploit Scripts☆12Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago