gpp-decrypt
☆25Apr 15, 2017Updated 8 years ago
Alternatives and similar repositories for gpp-decrypt
Users that are interested in gpp-decrypt are comparing it to the libraries listed below
Sorting:
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆184Aug 7, 2025Updated 7 months ago
- CTF write-ups by PDKT team with English and Indonesian language☆75Jun 3, 2019Updated 6 years ago
- coremail address list export☆12Sep 9, 2021Updated 4 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- A simple bash TCP port scanner☆23Jul 1, 2023Updated 2 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- Script and metasploit module for CVE-2018-15982☆11Aug 12, 2020Updated 5 years ago
- Plugin for x64dbg☆13Apr 29, 2017Updated 8 years ago
- ☆46May 9, 2017Updated 8 years ago
- brute-forcing su for fun and possibly profit☆100May 22, 2019Updated 6 years ago
- Patches needed to build VMware (Player and Workstation) host modules against recent kernels☆17Sep 20, 2025Updated 6 months ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- Local CLI tool that lets you write natural language instructions and get the corresponding shell commands generated by a small language m…☆21Nov 18, 2025Updated 4 months ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- Bypassing Benefit's jailbreak detection☆12Jan 15, 2024Updated 2 years ago
- Using nested modules inside of the project and outside of $GOPATH☆13May 21, 2020Updated 5 years ago
- GitLab 12.9.0 Arbitrary File Read☆70Apr 23, 2021Updated 4 years ago
- A collection of four algotihms implemented in C++ and compared to find the longest common subsequence in strings with binary digits and o…☆12Jan 1, 2021Updated 5 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Juicy Potato for x86 Windows☆130Oct 12, 2019Updated 6 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- Experimentation with Sentiment Analysis on Phishing Email Datasets. Machine-learning techniques to help classify the overall emotional co…☆16Nov 25, 2020Updated 5 years ago
- davtest (improved)- Exploits WebDAV folders☆121Mar 7, 2023Updated 3 years ago
- Professional RAG development skills for Claude Code - audit, evaluate, optimize, and scaffold RAG pipelines☆26Jan 18, 2026Updated 2 months ago
- personal blog☆12Mar 5, 2026Updated 2 weeks ago
- Various code snippets☆281Feb 8, 2026Updated last month
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- A tool box with 174 useful and common Linux tools for penetration testing and security audits.☆16Sep 19, 2023Updated 2 years ago
- Agent Canvas helps teams describe, prototype, evaluate, and export multi-agent systems that run on the Microsoft Agent Framework. Start f…☆30Nov 17, 2025Updated 4 months ago
- Handy Stored Password Decryption Techniques☆164Jun 9, 2021Updated 4 years ago