Deobfuscate passwords (Jetty, WebStorm, etc)
☆19May 10, 2016Updated 9 years ago
Alternatives and similar repositories for deobf
Users that are interested in deobf are comparing it to the libraries listed below
Sorting:
- morse encode and decode☆18Jan 8, 2023Updated 3 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- A library and tool for querying, executing and exporting TR-064 devices and services☆10Apr 4, 2018Updated 7 years ago
- Tool for comparing Jar files or Zip files☆12Jul 6, 2016Updated 9 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Randomly kills and removes running docker container.☆12Jun 10, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆11Oct 15, 2024Updated last year
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- This cookbook installs Nexpose☆13Dec 15, 2023Updated 2 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- A platformer video game with a very old-school theme. Based on the Jumpman series by Randy Glover.☆16Mar 23, 2025Updated 11 months ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- Merges a microcontroller (Teensy w/Arduino) with a magstripe swiper☆23Apr 8, 2019Updated 6 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Feb 28, 2020Updated 6 years ago
- A Docker container for Known.☆17Nov 13, 2019Updated 6 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- Bluetooth Proxy☆16Dec 18, 2012Updated 13 years ago
- Useful Alfred Snippets for Pentest☆18Dec 5, 2024Updated last year
- ☆17May 1, 2025Updated 10 months ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- The Authentic Software Guard☆13Dec 20, 2015Updated 10 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Tomcat Clustering inside the Docker☆16Jul 25, 2022Updated 3 years ago
- ☆15Aug 30, 2022Updated 3 years ago
- ☆20Apr 16, 2025Updated 10 months ago
- General scripts that gather information out of Active Directory☆16Jun 9, 2022Updated 3 years ago
- Alternative hexdump.