Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
@0x00wolf
0x00wolf
Follow
View 0x00wolf's full-sized avatar

Wolf 0x00wolf

57 65 6C 63 6F 6D 65 20 74 6F 20 6D 79 20 47 69 74 68 75 62 20 70 72 6F 66 69 6C 65 2E

    Block or report 0x00wolf

    Block user

    Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

    You must be logged in to block users.

    Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
    Report abuse

    Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

    Report abuse

    PinnedLoading

    1. hkrsAIhkrsAIPublic

      The keep it simple approach to integrating ChatGPT into your Linux terminal workflow. Featuring 100's of pre-made system prompts from the most popular repos on Github, and useful context-management…

      Python 4

    2. PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-PythonPATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-PythonPublic

      Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by ad…

      Python 27 2

    3. AES256-encoder-decoderAES256-encoder-decoderPublic

      A command line tool written in Python that can generate 256-bit AES keys and uses cipher feedback encryption in a bit stream to encode and decode files.

      Python 6 1

    4. Skills-for-Hire-CybersecuritySkills-for-Hire-CybersecurityPublic

      A collection of code I wrote for Digital Nova Scotia's Skills for Hire cybersecurity career training.

      Python 2

    5. red-team-cookbookred-team-cookbookPublic

      Learn to emulate the programmatic methods high-level adversaries employ to wage cyber-warfare.

      Python 3

    6. virtual-privacyvirtual-privacyPublic

      A Pythonic Swiss-Army knife for conducting covert communications over insecure networks, generating encrypted reverse-shells, file transfers, and secure data storage.

      Python 2


    [8]ページ先頭

    ©2009-2025 Movatter.jp