tigertv / secretpy
Classical ciphers: Caesar, ADFGX, ROT13 and etc.
☆61Updated 3 years ago
Alternatives and similar repositories for secretpy:
Users that are interested in secretpy are comparing it to the libraries listed below
- Secret Sharing implementation using Lagrange interpolation in python☆13Updated 2 years ago
- Script allowing hiding or revealing data in image files.☆26Updated 3 years ago
- Tools for encryption, decryption and cracking from several cryptographic systems.☆37Updated last year
- Python Enigma cypher machine simulator.☆68Updated 2 weeks ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- General scripts☆33Updated 6 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Updated 8 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 4 years ago
- GitHub Trending publisher☆19Updated 3 years ago
- A Street Art Notepad++ Style for Different Programming Languages☆21Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 10 months ago
- Fast defcon 26 quals pow solver☆25Updated 6 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Updated 4 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- ☆20Updated 5 years ago
- Phoenix☆44Updated 6 years ago
- Scrapes specified files, generating a pretty google powered map with geoip results☆47Updated 9 years ago
- Pysh: the python shell☆20Updated 8 years ago
- The random (fake!) quote generator.☆32Updated 3 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆15Updated 8 years ago
- Man-in-the-middle against Tor bridges☆26Updated 4 years ago
- Multi-head SSH honeypot system.☆21Updated 10 months ago
- A simple capture the flag framework.☆121Updated 7 years ago
- ARP ping detector on local network☆15Updated 11 years ago
- Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.☆10Updated last year
- A possible method for faster-than-light communication☆43Updated last year
- A tiny framework for easily manipulate the tty and create fake binaries.☆154Updated 4 years ago
- A simple C keylogger for Linux☆63Updated 4 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Updated 5 years ago