Unpacking tool for the zipExec Crypter
☆14Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for zipExec_unpack
Users that are interested in zipExec_unpack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Jul 13, 2022Updated 3 years ago
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆17Apr 22, 2024Updated 2 years ago
- IIS PUT WebDAV GetShell Exploit☆18Aug 15, 2020Updated 5 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Extract passwords from memory with strace☆41Nov 17, 2021Updated 4 years ago
- ☆10Oct 20, 2025Updated 6 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆33Aug 16, 2023Updated 2 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- awesome list of browser exploitation tutorials☆14Sep 21, 2018Updated 7 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆13Nov 17, 2012Updated 13 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Code By:Tas9er / F5 BIG-IP 远程命令执行漏洞☆14Mar 29, 2021Updated 5 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- ☆18Jan 9, 2026Updated 3 months ago
- 提供批量扫描URL以及执行命令功能。Workspace ONE Access 模板注入漏洞,可执行任意代码☆12Apr 15, 2022Updated 4 years ago
- exploit-database-papers☆14Nov 27, 2017Updated 8 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- The best game bot for mobile game vHack OS. It completely automates your game. So do not hesitate and download and play 24/7 like everyon…☆18Sep 8, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆84Aug 18, 2022Updated 3 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆11Feb 9, 2023Updated 3 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- Automated Pentest Recon Scanner☆14Jul 29, 2016Updated 9 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆53Oct 28, 2025Updated 6 months ago