GonnacryA Linux Ransomware
Stars: ✭ 341 (+147.1%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-12.32%)
Multi Party SchnorrRust implementation of multi-party Schnorr signatures over elliptic curves.
Stars: ✭ 115 (-16.67%)
ChestBash glue to encrypt and hide files
Stars: ✭ 123 (-10.87%)
Demo Twilio Backend NodejsA sample backend that demonstrates how to generate a Virgil JWT and Twilio token used for authentication with the Virgil and Twilio services
Stars: ✭ 128 (-7.25%)
CruzbitA simple decentralized peer-to-peer ledger implementation
Stars: ✭ 118 (-14.49%)
Sodium PlusDeveloper-friendly libsodium interface
Stars: ✭ 132 (-4.35%)
MbaMalware Behavior Analyzer
Stars: ✭ 125 (-9.42%)
Node Sha3SHA3 for JavaScript - The Keccak family of hash algorithms
Stars: ✭ 112 (-18.84%)
Vrf.jsA pure Javascript Implementation of Verifiable Random Functions
Stars: ✭ 124 (-10.14%)
Ergo Pe Av🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.
Stars: ✭ 130 (-5.8%)
UitkykRuntime memory analysis framework to identify Android malware
Stars: ✭ 133 (-3.62%)
DistaffZero-knowledge virtual machine written in Rust
Stars: ✭ 119 (-13.77%)
Torchbear🔥🐻 The Speakeasy Scripting Engine Which Combines Speed, Safety, and Simplicity
Stars: ✭ 128 (-7.25%)
Www.rootkit.comwww.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.
Stars: ✭ 117 (-15.22%)
Padding Oracle Attacker🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
Stars: ✭ 136 (-1.45%)
FlashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (-16.67%)
DeathransomA ransomware developed in python, with bypass technics, for educational purposes.
Stars: ✭ 126 (-8.7%)
BlockLet's make an annoyance free, better open internet, altogether!
Stars: ✭ 1,849 (+1239.86%)
BotanCryptography Toolkit
Stars: ✭ 1,798 (+1202.9%)
Password4jPassword4j is a user-friendly cryptographic library that supports Argon2, Bcrypt, Scrypt, PBKDF2 and various cryptographic hash functions.
Stars: ✭ 124 (-10.14%)
Tools For CryptanalysisA repository that aims to provide tools for cryptography and cryptanalysis
Stars: ✭ 112 (-18.84%)
SputterEthereum Virtual Machine (EVM) implementation
Stars: ✭ 111 (-19.57%)
Noise.NET Standard 1.3 implementation of the Noise Protocol Framework (revision 33 of the spec)
Stars: ✭ 124 (-10.14%)
Merkle TreeMerkle Trees and Merkle Inclusion Proofs
Stars: ✭ 130 (-5.8%)
I2pd🛡 I2P: End-to-End encrypted and anonymous Internet
Stars: ✭ 1,796 (+1201.45%)
AmsiscannerA C/C++ implementation of Microsoft's Antimalware Scan Interface
Stars: ✭ 134 (-2.9%)
Chromium GostChromium с поддержкой алгоритмов ГОСТ
Stars: ✭ 123 (-10.87%)
Libsodium DocGitbook documentation for libsodium
Stars: ✭ 129 (-6.52%)
Endesiveen-crypt, de-crypt, si-gn, ve-rify - smime, pdf, xades and plain files in pure python
Stars: ✭ 122 (-11.59%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-2.17%)
PycryptodomeA self-contained cryptographic library for Python
Stars: ✭ 1,817 (+1216.67%)
Stream CiphersCollection of stream cipher algorithms
Stars: ✭ 127 (-7.97%)
Hosts BlocklistsAutomatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Stars: ✭ 1,749 (+1167.39%)
ThreadboatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-4.35%)
CryptogotchasA collection of common (interesting) cryptographic mistakes.
Stars: ✭ 118 (-14.49%)
Solar🌞 Stellar wallet. Secure and user-friendly.
Stars: ✭ 117 (-15.22%)
CurvRust language general purpose elliptic curve cryptography.
Stars: ✭ 138 (+0%)
Open Crypto🔑 Hashing (BCrypt, SHA2, HMAC), encryption (AES), public-key (RSA), and random data generation.
Stars: ✭ 115 (-16.67%)
Mass RatBasic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-7.97%)
CharmA really tiny crypto library.
Stars: ✭ 116 (-15.94%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1205.8%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+8208.7%)
GitpassOpen Source Your Password (Mismanagement)!
Stars: ✭ 113 (-18.12%)
YpsilonAutomated Use Case Testing
Stars: ✭ 135 (-2.17%)
StreamcryptorStream encryption & decryption with libsodium and protobuf
Stars: ✭ 112 (-18.84%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-9.42%)
Green Hat SuiteGreen-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Stars: ✭ 112 (-18.84%)
PracticalmalwarelabsKeep track of the labs from the book "Practical Malware Analysis"
Stars: ✭ 130 (-5.8%)
PyceEncrypted Python Execution
Stars: ✭ 111 (-19.57%)
CryloggerCRYLOGGER: Detecting Crypto Misuses for Android and Java Apps Dynamically
Stars: ✭ 125 (-9.42%)
Mstar Bin ToolScripts to manipulate Mstar firmware binaries (e.g. MstarUpgrade.bin, LetvUpgrade.bin etc)
Stars: ✭ 137 (-0.72%)
Cli🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Stars: ✭ 2,151 (+1458.7%)
Tiny KeccakAn implementation of Keccak derived functions specified in FIPS-202, SP800-185 and KangarooTwelve
Stars: ✭ 134 (-2.9%)
Lockbox ExtensionExperimental Firefox extension for login management experiences, not being actively developed
Stars: ✭ 130 (-5.8%)