This python program Encrypts everything with AES 256 bit algorithm.
☆23Jul 23, 2017Updated 8 years ago
Alternatives and similar repositories for Encryption-Tool
Users that are interested in Encryption-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 16 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Malware analysis tool☆22Apr 27, 2025Updated last year
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Live import all your Google Sheets to your data warehouse☆23Mar 2, 2026Updated 2 months ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Dumps TeamViewer ID,Password and account settings from a running TeamViewer instance by enumerating child windows.☆45Sep 5, 2022Updated 3 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- A fully featured malware scanner for Linux desktops and servers.☆70May 18, 2022Updated 3 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Fault code reader☆11Oct 31, 2016Updated 9 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago