f4rih / truebrute
Simple Tool For Brute Force The Truecrypt Files
☆10Updated 10 years ago
Alternatives and similar repositories for truebrute:
Users that are interested in truebrute are comparing it to the libraries listed below
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- CTF Writeups☆19Updated 7 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- ~ ADMIN Panel Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆20Updated 8 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 7 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Updated 6 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- ☆19Updated 11 years ago
- MS17-010☆12Updated 7 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- best framework for information gathering ,pentesting and web aplication scanner☆9Updated 6 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆18Updated 7 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- ☆19Updated 7 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 7 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago