prajwalmali / cryptoLinks
This tool will encrypt-decrypt your files and directories. It has built-in password generator and featured with Colourful UI. It is based on AES (Advanced Encryption Standard) CBC mode Algorithm Symmetric Cryptography and made in Python language (Python3)
☆35Updated last year
Alternatives and similar repositories for crypto
Users that are interested in crypto are comparing it to the libraries listed below
Sorting:
- This is a complete project series on implementing hacking tools available in Kali Linux into python.☆44Updated 4 years ago
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆87Updated 5 months ago
- this key logger is connected to the robot of telegram!☆9Updated 4 months ago
- A simple and handy tool for a hacker to gain remote access and control another computer☆36Updated 4 years ago
- Ethical Hacking Course with Kali Linux Operation System in Pyhton☆37Updated 4 years ago
- This tool is a remote Python keylogger for MS Windows, Mac OS and Linux OSs. This is an Ethical Hacker Educational tool used for educatio…☆74Updated 4 years ago
- ☆25Updated 5 years ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Updated last year
- ☆47Updated last year
- sameer-k-dev / Ethical-Hacking-Hack-every-password-on-any-PC-with-USB-USB-Password-stealing-drive-USB-HacksEthical Hacking | Hack every password on any PC with USB | USB Password stealing drive | USB Hacks☆28Updated 4 years ago
- Make custom phishing page with Black-Water you just need to put required in create folder.☆35Updated 5 years ago
- Crypton: linux Pentester tools, penetration testing and ethical hacking☆65Updated 6 years ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆68Updated 5 years ago
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆13Updated 4 years ago
- This is an advanced keylogger which sends keylog reports every 30 minutes to the specified email on the config file.☆21Updated 3 years ago
- Files and notes for the Python Crash Course Keylogger☆53Updated 5 years ago
- Project Idea Briefing • The primary benefit of ethical hacking is to prevent data from being stolen and misused by malicious attacker…☆47Updated 3 years ago
- Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords☆13Updated 8 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆84Updated 7 years ago
- evil twin on android☆36Updated 6 years ago
- Simple script masks the phishing link under the normal URL☆84Updated 4 years ago
- PHP email spoofer | Send emails from any email adress☆81Updated 5 years ago
- ATANK is a android ransomware builder☆70Updated 4 years ago
- Google Chrome Database Cracking Hacking - Get username & passwords☆70Updated 5 months ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 2 years ago
- Get information of any phone number. A simple color full tool in python3 for extracting information.☆59Updated 7 months ago
- Combo List Generator for Android Devices (Termux) by @Voldemort1912.