mehaase / encoding-tools
An interactive, browser-based utility for transforming binary strings, e.g. encoding, decoding, hashing, etc.
☆26Updated 10 months ago
Related projects: ⓘ
- A list of backdoor samples I find online.☆13Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 3 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated last week
- Analyze zipfile, either local, or from url☆32Updated 10 months ago
- How to mix C and Go with cgo on Windows☆20Updated 7 years ago
- ☆16Updated last year
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Updated 6 months ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- Go wrapper for awslabs/certlint☆24Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆61Updated 6 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Curl in WebAssembly☆12Updated 3 years ago
- ☆15Updated this week
- Like curl, or wget, but downloads directly go to a SQLite databse☆25Updated 3 years ago
- Hashpic creates an image from a MD5, SHA512, SHA3-512, Blake2b or SHAKE256 hash☆24Updated 5 months ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 3 years ago
- A plugin based GraphQL vulnerability assessment tool.☆12Updated 3 years ago
- Collection of dynamic security related helpers☆15Updated last year
- ☆11Updated this week
- Automated daily scan using Nmap and report on the differences☆16Updated 6 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- Open YARA scan- and search engine☆15Updated last year
- Analyse binaries for missing security features, information disclosure and more...☆84Updated last year
- GO sandbox to run untrusted code☆40Updated 4 years ago
- Rex library for text generation and manipulation☆21Updated 4 months ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆29Updated 2 years ago