yashk2810 / Encryption-ToolLinks
This python program Encrypts everything with AES 256 bit algorithm.
☆23Updated 8 years ago
Alternatives and similar repositories for Encryption-Tool
Users that are interested in Encryption-Tool are comparing it to the libraries listed below
Sorting:
- ☆17Updated 9 years ago
- Simple Asynchronous HTTP Proxy written in python☆48Updated 11 years ago
- Simple brute forcing in Python.☆104Updated 2 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- A little Keylogger for Windows developed in C++☆21Updated 9 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 4 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 8 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆128Updated 12 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- Network white noise collector☆19Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- [Python] Google Scraper & Mass Exploiter☆29Updated 4 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Extract useful information from a Twitter account.☆35Updated 11 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆72Updated 10 years ago