Reveal encrypted files stored on a filesystem.
☆53Nov 9, 2018Updated 7 years ago
Alternatives and similar repositories for TCHunt-ng
Users that are interested in TCHunt-ng are comparing it to the libraries listed below
Sorting:
- Truehunter☆30May 15, 2021Updated 4 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Arch Linux installation, security hardening and automatic deployment setup scripts.☆20Jul 24, 2016Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Stargazerz - export repository 🌟 stargazers 🌟 profile as JSON☆10Nov 26, 2016Updated 9 years ago
- ☆14May 17, 2018Updated 7 years ago
- VMware Snapshot Forensic Comparison Scripts☆25Mar 19, 2013Updated 13 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- drop-in replacement for graphite node using Riak TS☆13Aug 6, 2016Updated 9 years ago
- Clustered in-memory database based on MNESIA with simple SQL layer☆20Feb 10, 2020Updated 6 years ago
- A Volatility plugin for finding sqlite database rows☆21Jul 14, 2019Updated 6 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 8 months ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- Python port of UMSKT☆12May 5, 2024Updated last year
- Smoking Linux Every Day!☆56Jul 18, 2020Updated 5 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Feb 2, 2017Updated 9 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆24Nov 16, 2020Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Randomizer, corruptor, and more for the game named Façade☆15Jun 1, 2023Updated 2 years ago
- lpstyl is a Non-MacOS StyleWriter driver.☆13Apr 26, 2017Updated 8 years ago
- Tool to parse SRU database☆25Mar 1, 2018Updated 8 years ago
- Bayesian Inference with Markov Chain Monte Carlo in Clojure☆16Mar 12, 2014Updated 12 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Halo1 Xbox map editor☆16Aug 27, 2017Updated 8 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago