Seyptoo / 7z-BruteForceView external linksLinks
This repository consists of bruteforce to a 7z file, and it can be very useful in the penetration tests
☆42May 15, 2019Updated 6 years ago
Alternatives and similar repositories for 7z-BruteForce
Users that are interested in 7z-BruteForce are comparing it to the libraries listed below
Sorting:
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Send an email and check if it was opened or not☆16May 17, 2018Updated 7 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Oct 25, 2021Updated 4 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated this week
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- PewCrypt Ransomware Source☆59Mar 22, 2019Updated 6 years ago
- Switch between two running operating systems without losing their state.☆53Jan 2, 2026Updated last month
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- ☆10Aug 4, 2022Updated 3 years ago
- Hollywood-style CCTV hacking - PoC☆39May 30, 2020Updated 5 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆82Nov 13, 2021Updated 4 years ago
- Exploits for Magento 2.3.0 and lower☆146Mar 29, 2019Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 6 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Dec 12, 2018Updated 7 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- A fully automated setup of Shibboleth Idp and SP with many options and features☆12Mar 31, 2022Updated 3 years ago
- ☆11Nov 29, 2018Updated 7 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- ☆37May 9, 2019Updated 6 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- print today's schedule☆10Mar 12, 2022Updated 3 years ago
- Fork of the kernel backports repository☆12Aug 5, 2025Updated 6 months ago
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago