BoboTiG / cracker-ngLinks
ZIP cracker, CCRYPT cracker, and others to come.
☆92Updated 4 months ago
Alternatives and similar repositories for cracker-ng
Users that are interested in cracker-ng are comparing it to the libraries listed below
Sorting:
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- apk binder script☆60Updated 11 years ago
- Transplant adore rootkit for Android platform.☆37Updated 10 years ago
- Encrypting a PNG into an Android application☆67Updated 6 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- Graphical user interface for the windows version of THC Hydra☆53Updated 7 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆42Updated 2 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago
- FUZZBUNCH - NSA security tools☆76Updated 8 years ago
- arp-poison (aka arp spoof) tool☆40Updated 12 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆39Updated 8 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Various Crypter Project☆52Updated 11 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Mutation Of Vıruses☆49Updated 9 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago