3ximus / md5-collisionsView external linksLinks
MD5 collision testing
☆17Nov 24, 2024Updated last year
Alternatives and similar repositories for md5-collisions
Users that are interested in md5-collisions are comparing it to the libraries listed below
Sorting:
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 9 years ago
- AppContainerBypass☆21Apr 4, 2021Updated 4 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 2 months ago
- A Game of Life simulator written in Bash☆19Apr 29, 2013Updated 12 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- ☆25Apr 30, 2021Updated 4 years ago
- cs4.0 cs 4.1 beacon加解密☆25Mar 29, 2021Updated 4 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- Store Manager is a web application that helps store owners manage sales and product inventory records.☆10Sep 29, 2019Updated 6 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- [deprecated] see README☆42May 15, 2020Updated 5 years ago
- Detect burp☆33Jun 7, 2021Updated 4 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆39Aug 29, 2023Updated 2 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- 加密壳☆35Mar 14, 2020Updated 5 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Sep 23, 2021Updated 4 years ago
- A scheduler and resource planning component built for React and made for modern browsers (IE10+)☆11Nov 10, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ☆11Apr 6, 2018Updated 7 years ago
- ☆10Jul 5, 2016Updated 9 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- hashcat benchmarks on AWS instances☆39Sep 15, 2025Updated 4 months ago
- A tool to help you understand TPM commands and responses.☆48Dec 3, 2024Updated last year
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Scan for subdomains using bruteforcing techniques☆49Jun 20, 2024Updated last year