tigertv / secretpyLinks
Classical ciphers: Caesar, ADFGX, ROT13 and etc.
☆60Updated 4 years ago
Alternatives and similar repositories for secretpy
Users that are interested in secretpy are comparing it to the libraries listed below
Sorting:
- Detect hidden files and text in images☆126Updated 2 years ago
- Obfuscate your python script by converting it to emoji icons☆141Updated 5 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆18Updated 3 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 5 years ago
- A netcat alternative with remote code execution.☆38Updated 5 years ago
- WIP of a script that tries to identify symbol ciphers (for now) available on dcode.fr based on input.☆16Updated 2 years ago
- python module containing many classical cipher algorithms: Caesar, Vigenere, ADFGVX, Enigma etc.☆226Updated 5 years ago
- Pwn2Win CTF 2020 flag submissions☆29Updated 5 years ago
- "Zero Click" Remote Code Execution in Mycroft AI vocal assistant☆56Updated 7 years ago
- Fast defcon 26 quals pow solver☆24Updated 7 years ago
- Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest☆227Updated last year
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆153Updated 11 months ago
- Stegdetect is an automated tool for detecting steganographic content in images.☆69Updated 3 years ago
- A CTF platform used in IceCTF 2016☆69Updated 5 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- A Python Script to find admin panel of any site☆24Updated 3 years ago
- Automated Cyber Offense☆88Updated 6 years ago
- Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers☆29Updated 8 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆127Updated 11 months ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- 🐧 Assembly with Linux (Notes, Syscalls, Protection Rings) 🐧☆132Updated last year
- Pixel Safe Encryption - Now Cryptographically Secure☆57Updated 2 years ago
- Phoenix☆49Updated 7 years ago
- Least-Significant-Bit tool for steganography☆79Updated 7 years ago
- Password Similarity Detection Using Deep Neural Networks. This project was the case study of my bachelor's thesis.☆23Updated 4 years ago
- talking LED mask for BSides 2020 presenters☆22Updated 5 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Updated 4 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Updated 12 years ago
- ☆26Updated 4 years ago