Decrypt and recover data (passwords, cookies, history, credit card) from navigator (chrome, firefox, IE, ...), wifi, windows systems, ...
☆20Jul 12, 2019Updated 6 years ago
Alternatives and similar repositories for LDMv2
Users that are interested in LDMv2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Direct shell in C. Reverse shell in C. Both over TCP.☆35Dec 14, 2016Updated 9 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Roblox Hack Free Robux Generator Unlimited. Roblox Robux Hack. Roblox Free Robux. Roblox Robux Generator. Roblox Unlimited Robux. Roblox …☆19Nov 21, 2021Updated 4 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Convert .bat files to .vbs☆14Aug 15, 2023Updated 2 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆16Sep 2, 2025Updated 8 months ago
- ☆11Aug 2, 2017Updated 8 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Scripts and other stuff for Termux, a Linux environment for Android☆11Dec 16, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- This tool is a plugin based version checker for .NET obfuscators.☆11Jun 13, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆21Mar 11, 2023Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆16Dec 6, 2021Updated 4 years ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆17Feb 5, 2015Updated 11 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Oct 23, 2019Updated 6 years ago
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Mar 21, 2019Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Thrift API for Xiaomi Structured Datastore Service☆13Feb 28, 2015Updated 11 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Encrypts and loads encrypted DLLs☆58Nov 14, 2018Updated 7 years ago
- A simple parser(library) which extracts shimcache data from windows.☆16May 20, 2019Updated 6 years ago
- ☆15Jan 30, 2025Updated last year
- Automated solution to set up Termux environment quickly and effortlessly.☆11Jun 10, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Explore your activity on Google with R: How to Analyze and Visualize Your Personal Data Search History. Find out how and how much you hav…☆13Mar 13, 2021Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Read Navicat 12 Password☆19Jun 7, 2020Updated 5 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆47Jun 10, 2016Updated 9 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ApertaCookie is a PowerShell module that can extract and decrypt cookie data from the SQLite databases of several popular browsers.☆13Apr 3, 2022Updated 4 years ago