arex1337 / Passpal
Password analysis software
☆37Updated 9 years ago
Alternatives and similar repositories for Passpal:
Users that are interested in Passpal are comparing it to the libraries listed below
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆27Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- ☆25Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- The Zonefile Transfer Toolkit☆28Updated last month
- tundeep☆43Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 5 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- ☆39Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago