sayoojsamuel / crypot
Library of Crypto exploits
☆10Updated last year
Alternatives and similar repositories for crypot:
Users that are interested in crypot are comparing it to the libraries listed below
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago
- Cryptanalysis and attack library☆22Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated last year
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Password spraying toolkit☆7Updated 4 years ago
- Local Privilege Escalation Miner☆26Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago