darkk / keebruteLinks
Tool to brute-force password of Keepass KDB database
☆16Updated 12 years ago
Alternatives and similar repositories for keebrute
Users that are interested in keebrute are comparing it to the libraries listed below
Sorting:
- python based backdoor software☆17Updated 13 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Updated 11 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- ☆15Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- Identify web application versions☆18Updated 8 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆23Updated 7 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- post-exploitation tools☆15Updated 7 years ago
- A static analysis framework for NASL.☆14Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 9 months ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- A wrapper for dd☆20Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Updated 8 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆10Updated 4 years ago
- A Go library which main purpose is giving an interface to loop over a dictionary and use those words/lines as input for some custom logic…☆56Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- ☆17Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 10 years ago