dhondta / recursive-compressionLinks
Tinyscript tool for recursively (de)compressing nested archives using multiple algorithms (bzip2, rar, lzma, ...)
☆12Updated last year
Alternatives and similar repositories for recursive-compression
Users that are interested in recursive-compression are comparing it to the libraries listed below
Sorting:
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- ☆13Updated 4 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- ☆16Updated 2 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- HashExpoit is Great Tool For Cracking Hash☆25Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 4 years ago
- Disassembler Library for x86 and x86-64☆8Updated 10 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- Exploits for TRENDNet routers☆13Updated 5 years ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- A privilege escalation exploit in the Steam Client☆13Updated 5 years ago
- 📝 Instagram Info Scraper☆15Updated 4 years ago
- Development☆11Updated 4 years ago
- Quick script to check for plagiarism between two documents☆16Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- Digital Forensics and Incident Response (DFIR) Workshop☆10Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Collection of cracked malware☆14Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago