Find and collect parts of a Keepass master key to recover it in plain text from a memory dump
☆20Feb 1, 2024Updated 2 years ago
Alternatives and similar repositories for keepass-dump-extractor
Users that are interested in keepass-dump-extractor are comparing it to the libraries listed below
Sorting:
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Python exploit for the vsftpd 2.3.4☆25Jul 24, 2024Updated last year
- D2R MapHack☆11Jun 10, 2022Updated 3 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- Adminlte template for yii 2 framework☆11Apr 27, 2017Updated 8 years ago
- ☆34Apr 16, 2022Updated 3 years ago
- Hacking Notes☆40Oct 27, 2025Updated 4 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆79Oct 18, 2024Updated last year
- Mickey's Blogs☆42Feb 12, 2026Updated 2 weeks ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- GridDB Foreign Data Wrapper for PostgreSQL☆13Feb 10, 2025Updated last year
- Vagrant provisioning scripts to create a simulated network environment for tabletop exercises☆43Jul 28, 2022Updated 3 years ago
- Program help to check and book the available slots in BBDC, and send notification to your phone via Telegram/Discord.☆10Jun 20, 2023Updated 2 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- Laravel based headless CMS with a head☆11Apr 19, 2023Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆10Jan 10, 2024Updated 2 years ago
- For SaaS applications it is sometimes important to show the resource URL to be sequentially incrementing and starting from 1. In a standa…☆21Dec 7, 2023Updated 2 years ago
- Documentation for Knowage Server☆12Dec 19, 2025Updated 2 months ago
- Bundle implementation for Sencha Touch☆23Jan 2, 2014Updated 12 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- HyteraTAK - Hytera to Cursor-On-Target Gateway☆12Jun 6, 2022Updated 3 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- Magento2 docker image generator☆10Nov 2, 2018Updated 7 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- bash CLI for doing things in a 'curl' way ..☆11Jan 19, 2021Updated 5 years ago
- integration between FreeTAKServer and Meshtastic using MQTT and Node red☆12Feb 2, 2025Updated last year
- ☆11Aug 31, 2023Updated 2 years ago
- A script for creating elixir image for phoenix framework.☆10Dec 15, 2023Updated 2 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- ☆12Oct 27, 2020Updated 5 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- How to redirect the customer to a custom page after logging in☆14May 13, 2019Updated 6 years ago
- Maintainers: Paul☆25Jun 30, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago