skelsec / unicrypto
Unified interface for some crypto algos
☆12Updated last week
Alternatives and similar repositories for unicrypto:
Users that are interested in unicrypto are comparing it to the libraries listed below
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Registry hive parsing the async way☆21Updated last month
- The best way to send emails in Go.☆10Updated 4 years ago
- ☆11Updated 4 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated last week
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Password spraying toolkit☆7Updated 4 years ago
- Firebase Domain Front Code☆21Updated 3 years ago
- Tool to manage user privileges☆28Updated 5 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- ☆12Updated 4 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Automatically perform advanced NTLM hash relay attacks☆14Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Active Directory Password Spray Testing Utility in Go☆16Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Cobalt Strike Get clipboard plugin☆12Updated last year
- Unamanged PS with Named Pipes☆9Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- ☆12Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- Obtain and parse SSL certificates☆10Updated 3 years ago