theblackcat102 / awesome-code-obfuscation
Collections of code obfuscation libaries for different languages ( in progress )
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for awesome-code-obfuscation
- Library of Crypto exploits☆9Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆20Updated 2 years ago
- A tool to encode and decode content as whitespace☆14Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Open YARA scan- and search engine☆17Updated last week
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 2 years ago
- Standardizing Security Titles☆13Updated last year
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆16Updated 4 years ago
- ☆14Updated last year
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- A poor man's access control for cloud- security groups and firewalls. Enable deployments by temporary allowing addresses!☆13Updated last month
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆10Updated last year
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Updated 7 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated last month
- Source code for the Binaries of OWASP WrongSecrets☆10Updated 2 weeks ago
- Host IDS for desktop users☆11Updated 3 years ago
- ☆15Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Updated 2 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Updated 2 years ago