sayoojsamuel / crypot
Library of Crypto exploits
☆10Updated last year
Alternatives and similar repositories for crypot:
Users that are interested in crypot are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Cryptanalysis and attack library☆22Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Open YARA scan- and search engine☆20Updated last month
- Automated encryption utilities and installation☆12Updated 4 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Automated Payload Test Controller☆9Updated 7 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated last month
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆13Updated last year
- Password spraying toolkit☆7Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated last year
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 4 years ago