Python script file to crack encrypted .pdf files using a dictionary attack or a hash attack.
☆23Mar 23, 2021Updated 5 years ago
Alternatives and similar repositories for PDF-CRACKER
Users that are interested in PDF-CRACKER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- FRAC and RIFT☆17Mar 16, 2019Updated 7 years ago
- Layout clone of Hike Messenger.☆12Apr 3, 2018Updated 8 years ago
- warnsdorff's algorithm to solve the knight's tour problem.☆10Oct 27, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆15Aug 2, 2017Updated 8 years ago
- Infinity can get phone numbers from facebook accounts with some maths and sht.☆13Feb 13, 2018Updated 8 years ago
- traversal functionality for the Shift AST format☆21Feb 16, 2019Updated 7 years ago
- iOS逆向学习☆20Jul 14, 2021Updated 4 years ago
- minihttp server in C++17 (one file)☆14Jul 21, 2019Updated 6 years ago
- Google chrome extensions downloader coded in python☆15Dec 7, 2018Updated 7 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- Extended library for C language (c99, x86-64, [linux, windows]).☆11Nov 6, 2021Updated 4 years ago
- Useful tools for reverse out of the box (Unix compatible)☆11Aug 31, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python Script To Brute Force Rar archive files☆10Oct 27, 2019Updated 6 years ago
- This is a Dribbble clone app created using Next.js. Bribbble is an app for sharing, discovering, and celebrating creative brilliance.☆14Dec 22, 2023Updated 2 years ago
- Just my Asm programs :)☆11Nov 2, 2021Updated 4 years ago
- Yet anther pkg, tiny binary and custom icon, pack your Node.js project into single executable☆13Apr 28, 2020Updated 6 years ago
- Short script to decode output logs of *sslsplit* raw HTTP packets.☆17Aug 12, 2016Updated 9 years ago
- Darwin/Vulva/Jarwin basic env.☆15Aug 26, 2018Updated 7 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- Search without being tracked-(Your Own Private Search Engine )☆17Jul 4, 2021Updated 4 years ago
- ☆10Aug 25, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Mute is an AdBlock filter for hiding user comments. Surf without the noise.☆12Aug 22, 2015Updated 10 years ago
- RaptorQ RFC6330 C++11 implementation☆12Sep 7, 2019Updated 6 years ago
- ☆19Jun 17, 2021Updated 4 years ago
- ☆14Jan 8, 2024Updated 2 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Oct 17, 2023Updated 2 years ago
- Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.☆46Jan 5, 2020Updated 6 years ago
- valentine's day card inside your terminal☆14Mar 3, 2019Updated 7 years ago
- Set your fingerprint lock with "Termux-security" on Termux to keep Termux secure ! (Termux: API Required)☆17Dec 25, 2025Updated 4 months ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11Mar 9, 2018Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Trying to be the best tool to search for exploits in the terminal.☆21Oct 23, 2022Updated 3 years ago
- ☆15Jun 29, 2020Updated 5 years ago
- Source Code Of:- https://www.udemy.com/course/learn-to-create-ai-assistant-jarvis-with-python/learn/☆14Nov 6, 2020Updated 5 years ago
- ☆19Dec 27, 2019Updated 6 years ago