skelsec / unicrypto
Unified interface for some crypto algos
☆12Updated last month
Alternatives and similar repositories for unicrypto
Users that are interested in unicrypto are comparing it to the libraries listed below
Sorting:
- Monitor malware scanning services for your payloads☆11Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated this week
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- L3 proxy backed by Shadowsocks☆10Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated last month
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- ☆11Updated 4 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 3 years ago
- ☆14Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- ☆12Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- ☆15Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- ☆18Updated last year
- Automatically perform advanced NTLM hash relay attacks☆14Updated 2 years ago
- Post-Exploitation script to exfiltrate 7-zip files☆10Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Windows 权限提升 BadPotato☆13Updated 3 years ago