Tody-Guo / chntpw
chntpw for crack windows password using Linux
☆53Updated 11 years ago
Related projects: ⓘ
- ☆13Updated this week
- Chntpw fork aimed at automatic interaction☆58Updated 4 years ago
- ☆32Updated 11 years ago
- Fetch, install and search exploit archives from exploit sites.☆112Updated 11 months ago
- ☆29Updated 4 years ago
- Images and scripts for virtualization☆39Updated 2 years ago
- Android Pattern Crack Tool☆35Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 10 years ago
- Notes on offensive training☆15Updated 6 years ago
- archive of code from http://www.unicornscan.org/☆68Updated 12 years ago
- Reverse Shell for Android☆22Updated 10 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆25Updated 4 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Updated 7 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆81Updated 3 years ago
- Brute force and decryption of Android's Full Device Encryption☆63Updated 10 years ago
- NetcatGUI is a simple GUI program that is set to emulate the popular network "swiss army knife" tool netcat (nc) using an easy to use gra…☆38Updated 2 years ago
- Get clients and access points.☆48Updated 5 years ago
- A lightweight/secure honeypot using Lua scripts.☆22Updated 3 years ago
- ☆60Updated 2 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆38Updated 8 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 4 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- ☆19Updated this week
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- ☆69Updated this week
- Emerge for Blackarch - Download and compile packages as Emerge does☆64Updated 6 months ago
- ☆63Updated this week