TiagoANeves / TDTLinuxPWDView external linksLinks
Linux password crack
☆14Apr 11, 2022Updated 3 years ago
Alternatives and similar repositories for TDTLinuxPWD
Users that are interested in TDTLinuxPWD are comparing it to the libraries listed below
Sorting:
- Search and Destroy for ciphers☆16Jan 26, 2019Updated 7 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- Pwndb request API☆26Jul 9, 2020Updated 5 years ago
- Automatically create safes and permission with role groups based on your enterprise standards and policies☆12Jul 31, 2018Updated 7 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- CyberArk Identity API PowerShell Module☆11Apr 15, 2025Updated 10 months ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆10May 14, 2023Updated 2 years ago
- ☆10Apr 11, 2018Updated 7 years ago
- servidor mapa global completo com halls of hope☆11Nov 21, 2017Updated 8 years ago
- One-click bookmarklet que acha AWS, Azure, Stripe, Firebase, JWT e chaves de alta entropia em qualquer app em 10 segundos☆39Dec 19, 2025Updated last month
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- A simple, small in size and portable keylogger for Windows XP/Vista/7/8/10/11 that doesn't require .NET Framework.☆14Feb 16, 2022Updated 4 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- A few starter examples of ansible playbooks, to show features and how they work together. See http://galaxy.ansible.com for example role…☆10Aug 3, 2016Updated 9 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- To run time/IO related unit tests (e.g., sleep function calls, database queries, API calls, etc) faster using Swoole.☆12Feb 1, 2024Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- O Projeto FR1DA Web é uma aplicação interativa para administrar dispositivos Android via ADB e executar scripts Frida. Oferece funcionali…☆13Nov 20, 2024Updated last year
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- An easy way to maintain your WSL distros. Being able to reduce disk usage, move wsl and restore from vhdx file☆11Jan 13, 2026Updated last month
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Moved to HappyHackingSpace/pirebok☆14Updated this week
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 2 months ago
- All of my eJPT notes☆11May 31, 2024Updated last year
- A simple, intutive, feature rich, php web shell for pen testing.☆14Feb 4, 2020Updated 6 years ago
- Meus projetos pessoais☆13Dec 3, 2015Updated 10 years ago
- Ansible role to deploy Cyberark Central Policy Manager☆15Dec 5, 2024Updated last year
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago