encrypt and decrypt winscp password
☆11Aug 10, 2017Updated 8 years ago
Alternatives and similar repositories for winscppassword
Users that are interested in winscppassword are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My implementation of Halo's Gate technique in C#☆55Apr 20, 2022Updated 4 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- ☆20Aug 19, 2019Updated 6 years ago
- ☆16Aug 30, 2017Updated 8 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆35Dec 6, 2023Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆92Sep 9, 2022Updated 3 years ago
- Linux下的设备管理器(支持硬件信息检测、设备驱动安装和硬件性能测试)☆10Oct 22, 2013Updated 12 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Metasploit Framework☆31Jan 30, 2020Updated 6 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 11 months ago
- ☆19Aug 25, 2022Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Swift code to run a dylib on disk☆16May 9, 2022Updated 4 years ago
- A simple BOF (Beacon Object File) to search files in the system☆17Dec 2, 2023Updated 2 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Hackrf Signal Fox Hunting by decible level☆18Aug 8, 2019Updated 6 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 11 months ago
- Privacy Check Go☆25Feb 11, 2026Updated 3 months ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 5 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Aug 5, 2012Updated 13 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- Python botnet☆12Aug 15, 2015Updated 10 years ago
- GSM Base Station on Raspberry Pi using CalypsoBTS☆28Jan 6, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Various scripts & tools☆12Apr 22, 2024Updated 2 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 4 years ago
- Tools☆13Apr 20, 2023Updated 3 years ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Feb 13, 2023Updated 3 years ago
- ☆25Jul 7, 2022Updated 3 years ago