dhondta / recursive-compression
Tinyscript tool for recursively (de)compressing nested archives using multiple algorithms (bzip2, rar, lzma, ...)
☆12Updated last year
Alternatives and similar repositories for recursive-compression
Users that are interested in recursive-compression are comparing it to the libraries listed below
Sorting:
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Collection of cracked malware☆14Updated 6 years ago
- ☆13Updated 4 years ago
- Apache use after free bug infos / ASAN stack traces☆66Updated 6 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- module for certexfil☆15Updated 2 years ago
- Exploits for TRENDNet routers☆13Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- ☆18Updated last year
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- A Unix rootkit☆16Updated 4 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- ☆16Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆11Updated 4 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ARP Man-in-the-Middle tool☆29Updated 4 months ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago