Brute force cracking the compressed package | 暴力破解有密码的压缩包
☆36Feb 17, 2026Updated last month
Alternatives and similar repositories for BruteUnpackage
Users that are interested in BruteUnpackage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 31, 2023Updated 2 years ago
- ☆13May 21, 2025Updated 10 months ago
- 春秋云境靶场解题攻略☆10Jul 31, 2023Updated 2 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Java + Native 全自动 SSL Pinning 绕过脚本(Universal SSL Pinning Bypass Script (Java & Native Combined))☆46Jul 1, 2025Updated 8 months ago
- ☆20Nov 1, 2022Updated 3 years ago
- 异或shellcode和ppid欺骗免杀☆14Mar 8, 2022Updated 4 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- DevOps tool for networking☆16Jun 10, 2022Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆21Aug 1, 2024Updated last year
- ☆16Oct 18, 2024Updated last year
- 短视频去水印微信小程序源码前端 后端☆10Dec 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆15Feb 16, 2021Updated 5 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Jun 16, 2024Updated last year
- Little Yellow Chicken CTF Writeups☆17Sep 30, 2025Updated 5 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Oct 28, 2023Updated 2 years ago
- command control framework☆33Updated this week
- Enable RDP and set firewall by Windows API.☆21Mar 3, 2022Updated 4 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The code of My blog's artical,artical from http://www.cnblogs.com/linyilong3/☆16Aug 1, 2024Updated last year
- 一个针对shiro反序列化漏洞(CVE-2016-4437)的快速利用工具/A simple tool targeted at shiro framework attacks with ysoserial.☆24Jul 6, 2022Updated 3 years ago
- A tool used to dump the memory of a specific process on Android.☆14Feb 22, 2016Updated 10 years ago
- Android import hook library☆21Jan 21, 2014Updated 12 years ago
- 去除抖音水印☆13Sep 1, 2021Updated 4 years ago
- 基于注册表劫持BypassUAC☆28Dec 16, 2020Updated 5 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- 优选ip、优选域名、优选proxyip☆24Updated this week
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- android vpn by native code☆17Dec 20, 2013Updated 12 years ago
- ☆14Oct 27, 2017Updated 8 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Jan 15, 2022Updated 4 years ago
- ☆20Sep 24, 2025Updated 6 months ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆34Apr 7, 2022Updated 3 years ago