cruces's repositories
awesome-yara
A curated list of awesome YARA rules, tools, and people.
blackhat-python-book
Code from Blackhat Python book
client
Keybase Go Library, Client, Service, OS X, iOS, Android, Electron
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
dapper-secure-kernel-stable
The secure kernel used in Dapper Linux, following the 4.9.x stable series
dns-over-https
High performance DNS over HTTPS client & server
go-crypto
[mirror] Go supplementary cryptography libraries
Gray-Hacker-Resources
☠️Resources for CTFs and wargames, Cryptography, Forensics, Vulnerabilities and exploits, Reverse engineering, Web exploits, Post-exploration. For fun or profit.
harbian-audit
Hardened Debian GNU/Linux distro auditing
InfinityHook
Hook system calls, context switches, page faults and more.
keybase-bot
exploration with the keybase chat API
liveng
Next Generation Linux live distributions concepts.
malware-samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
matrix-blockstack-auth
A small web site to create one-time login for matrix with blockstack id which can be ran locally
pc
PRiVY CHAT [ P.C ]
PyExfil
A Python Package for Data Exfiltration
python-matrix-bot-api
A Python API for making Matrix bots (https://matrix.org).
python-sandboxapi
Minimal, consistent Python API for building integrations with malware sandboxes.
reversi
Generate very tiny reverse shell binaries for Linux~
revolt
Better desktop integration for Riot.im (not only) for GNOME
SDR-Notes
Notes and resorce's for SDR/Wireless tech
Security-Research
Exploits written by the Rhino Security Labs team
sn0int
Semi-automatic OSINT framework and package manager
StegCracker
Steganography brute-force utility to uncover hidden data inside files
The-Collection
Collection of cracked malware, and ebooks
ThreatIngestor
Extract and aggregate threat intelligence.
tweets_analyzer
Tweets metadata scraper & activity analyzer
wctf2019-gtf
WCTF2019 challenge: Gyotaku The Flag
yara-rules
A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.