Cisco Password Encryptor/Decryptor
☆26Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for c7decrypt
Users that are interested in c7decrypt are comparing it to the libraries listed below
Sorting:
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- Password list collected from Cisco devices☆20Mar 25, 2019Updated 6 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefil…☆18Mar 23, 2014Updated 11 years ago
- Functional testing of Puppet modules☆25Jan 24, 2014Updated 12 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- A short script to make it easy to create a viable, trusted self-signed certificate that can be used for SSL/TLS in particular.☆28Jan 12, 2019Updated 7 years ago
- Am I Secure? Python script to do system and config security checks.☆20Jun 26, 2017Updated 8 years ago
- CoudFormation template for installing PE☆31Jan 4, 2020Updated 6 years ago
- Python CLI managing a PowerDNS server trough the REST API☆14Nov 3, 2017Updated 8 years ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 2 months ago
- Puppet Iptables module is no longer maintained see:☆19Aug 30, 2011Updated 14 years ago
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- ☆16Oct 18, 2025Updated 5 months ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Azure Service Subdomain Enumeration☆72Sep 2, 2024Updated last year
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Mar 5, 2012Updated 14 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Air quality sensing and monitoring☆19Oct 15, 2018Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- Web UI for RainMachine Mini-8 and HD-12/16☆19Feb 8, 2025Updated last year
- A PowerShell module and scripts to facilitate AXL SOAP requests to Cisco Unified Communications Manager☆22Sep 21, 2018Updated 7 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- A Hiera-based micro-ENC for Puppet☆20Oct 13, 2015Updated 10 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Python module to access NotifyMyAndroid notification service☆32May 3, 2018Updated 7 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Suite of classes for Windows programming☆18Apr 13, 2016Updated 9 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- puppet module for freeipa☆43Jan 4, 2020Updated 6 years ago
- pwsh native host experiment☆12Jun 7, 2021Updated 4 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- For Interview, OSCP proof of concept code during the course.☆16Jul 26, 2019Updated 6 years ago
- ☆21Feb 19, 2019Updated 7 years ago