Wordlist to crack .zip-file password
☆206Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for vx-underground-wordlist
Users that are interested in vx-underground-wordlist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Useful OSINT hints and links☆216May 13, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆502Jun 28, 2025Updated 9 months ago
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 5 months ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆369May 22, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated 2 years ago
- ☆307Mar 15, 2025Updated last year
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- ☆216Dec 2, 2025Updated 4 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,357Updated this week
- Adversary Emulation Framework☆129Jul 1, 2025Updated 9 months ago
- OSCP Study Guide☆41Oct 10, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆135Aug 20, 2025Updated 7 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated last month
- Windows And Ways To Break It☆100Jan 28, 2026Updated 2 months ago
- OSCP Cheatsheet by Sai Sathvik Ruppa☆1,168Oct 3, 2024Updated last year
- eBPF hacks☆198Dec 12, 2024Updated last year
- ☆13Apr 14, 2024Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆391Feb 1, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆106Apr 21, 2024Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆81Mar 14, 2025Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆324Jan 10, 2023Updated 3 years ago
- ☆26Mar 11, 2025Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆153May 17, 2024Updated last year