Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+2013.33%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1793.33%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+3865%)
Ctf ToolsUseful CTF Tools
Stars: ✭ 190 (+216.67%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+540%)
DesudesutalkSteganography for imageboards
Stars: ✭ 100 (+66.67%)
TryHackMe-Write-UpThe entire walkthrough of all my resolved TryHackMe rooms
Stars: ✭ 53 (-11.67%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (+80%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (+5%)
hiddenwaveAn Audio Steganography Tool, written in C++
Stars: ✭ 46 (-23.33%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+575%)
GopaqueGo implementation of OPAQUE (hidden password user registration and auth)
Stars: ✭ 43 (-28.33%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-13.33%)
Cryptojs.swiftCross-platform cryptographic functions in swift
Stars: ✭ 42 (-30%)
CryptocatSecure chat software for your computer.
Stars: ✭ 1,011 (+1585%)
CryptographyCryptography for Flutter developers: encryption, digital signatures, key agreement, etc.
Stars: ✭ 56 (-6.67%)
PlasoSuper timeline all the things
Stars: ✭ 1,055 (+1658.33%)
Crypto blogsBlogs about Cryptography/Security to follow
Stars: ✭ 41 (-31.67%)
Swift CryptoOpen-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
Stars: ✭ 1,005 (+1575%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+14868.33%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (+1558.33%)
WolfsslwolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3!
Stars: ✭ 1,098 (+1730%)
LibtomcryptLibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of other routines.
Stars: ✭ 1,080 (+1700%)
Mirage CryptoCryptographic primitives for MirageOS
Stars: ✭ 39 (-35%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-26.67%)
Eddsa Fault AttackFault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (-11.67%)
F5stegojsJPEG steganography for browser and node. F5 algo in pure javascript.
Stars: ✭ 42 (-30%)
IpfsfbInterPlanetary File System for Business (IPFSfB) is an enterprise blockchain storage network based on InterPlanetary File System.
Stars: ✭ 57 (-5%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1581.67%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-15%)
Coniks JavaA CONIKS implementation in Java
Stars: ✭ 58 (-3.33%)
Simple CryptographyScripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Stars: ✭ 40 (-33.33%)
CognicryptCogniCrypt is an Eclipse plugin that supports Java developers in using Java Cryptographic APIs.
Stars: ✭ 50 (-16.67%)
AnonlinkPython implementation of anonymous linkage using cryptographic linkage keys
Stars: ✭ 41 (-31.67%)
QtumQtum Core Wallet
Stars: ✭ 1,080 (+1700%)
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (+1558.33%)
XortoolA tool to analyze multi-byte xor cipher
Stars: ✭ 993 (+1555%)
MinisignA dead simple tool to sign files and verify digital signatures.
Stars: ✭ 1,105 (+1741.67%)
KeysUncomplicated cryptography frameworks base on CommonCrypto
Stars: ✭ 47 (-21.67%)
Awesome Crypto PapersA curated list of cryptography papers, articles, tutorials and howtos.
Stars: ✭ 985 (+1541.67%)
Amt ForensicsRetrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
Stars: ✭ 37 (-38.33%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-8.33%)
Omemo TopTracking the Progress of OMEMO Integration in various clients
Stars: ✭ 47 (-21.67%)
Firefed🕵️ A tool for Firefox profile analysis, data extraction, forensics and hardening
Stars: ✭ 37 (-38.33%)
X25519Public key cryptography library for Ruby providing the X25519 Diffie-Hellman function
Stars: ✭ 37 (-38.33%)
ExonumAn extensible open-source framework for creating private/permissioned blockchain applications
Stars: ✭ 1,037 (+1628.33%)
LibpkiEasy-to-use high-level library for PKI-enabled applications
Stars: ✭ 36 (-40%)
CryptoanalysisCogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Stars: ✭ 36 (-40%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-3.33%)
Merkle ToolsTools for creating Merkle trees, generating merkle proofs, and verification of merkle proofs.
Stars: ✭ 54 (-10%)
Al Go Rithms🎵 Algorithms written in different programming languages - https://zoranpandovski.github.io/al-go-rithms/
Stars: ✭ 1,036 (+1626.67%)
KsuidJava implementation of K-Sortable Globally Unique IDs
Stars: ✭ 35 (-41.67%)
CryptographyCryptography Android application code samples / cipher collection for app users
Stars: ✭ 35 (-41.67%)
JoeeccElliptic Curve Cryptography playground/toolkit written in pure Python
Stars: ✭ 46 (-23.33%)