yashk2810 / Encryption-ToolLinks
This python program Encrypts everything with AES 256 bit algorithm.
☆23Updated 8 years ago
Alternatives and similar repositories for Encryption-Tool
Users that are interested in Encryption-Tool are comparing it to the libraries listed below
Sorting:
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago
- A little Keylogger for Windows developed in C++☆21Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Simple detector of ARP poisoning attack☆29Updated 10 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- ☆17Updated 10 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 12 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 8 years ago
- Prints the IPs on your local network that're sending the most packets☆152Updated 4 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆12Updated 8 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- ☆17Updated 11 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago