yashk2810 / Encryption-Tool
This python program Encrypts everything with AES 256 bit algorithm.
☆23Updated 7 years ago
Alternatives and similar repositories for Encryption-Tool:
Users that are interested in Encryption-Tool are comparing it to the libraries listed below
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 7 years ago
- Simple Asynchronous HTTP Proxy written in python☆47Updated 10 years ago
- Convert your video files to images transcribed with their subtitles☆28Updated 9 years ago
- ARP ping detector on local network☆15Updated 12 years ago
- ☆17Updated 9 years ago
- #7DaysOfCode Challenge. Next step #100DaysOfCode☆11Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 4 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- Python script to help you decide what movie to watch.☆34Updated 9 years ago
- A Linux terminal utility to find upcoming hackathons near you or at a particular location.☆36Updated 8 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- Python wrappers on nmcli for easy MAC spoofing compatible with NetworkManager☆10Updated 8 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Updated 10 years ago
- Various pentest scripts☆13Updated 11 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Updated 6 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- Network white noise collector☆18Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- CDDC Exploitation Framework☆13Updated last year
- Simple brute forcing in Python.☆104Updated last year
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆10Updated 9 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆34Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Create shellcode from executable or assembly code☆12Updated 7 years ago