http://shadowcrypt-release.weebly.com/
☆58Aug 13, 2016Updated 9 years ago
Alternatives and similar repositories for shadowcrypt
Users that are interested in shadowcrypt are comparing it to the libraries listed below
Sorting:
- HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Ap…☆22Jul 6, 2021Updated 4 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Jan 11, 2015Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Mapas Coletivos API Service☆26Oct 20, 2019Updated 6 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Citizen Relationship Management Open Semantic Platform☆12Apr 5, 2019Updated 6 years ago
- ☆12Jul 7, 2014Updated 11 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Trading bot for cryptocurrencies with recurrent neural networks.☆10Mar 24, 2015Updated 10 years ago
- HTTP interface for a NeDB database☆12Dec 14, 2013Updated 12 years ago
- NeDB adapter for Fortune.☆10Sep 14, 2017Updated 8 years ago
- Auto-play TFT for token reward.☆10Feb 14, 2020Updated 6 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Yell is a program for diffuse scattering interpretation using the 3D-∆PDF refinement.☆13Updated this week
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- pIpe is ifttt for websites/webservices linked to webservices/smartphones/desktops with advanced filters☆224Oct 1, 2012Updated 13 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- This is a proof of concept exploit which bypasses root detection in Samsung's Knox Messenger. This has been reported to Knox Messenger te…☆15Jan 30, 2020Updated 6 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- ☆10May 30, 2015Updated 10 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago