glv2 / bruteforce-luksView external linksLinks
Try to find the password of a LUKS encrypted volume.
☆275Mar 1, 2024Updated last year
Alternatives and similar repositories for bruteforce-luks
Users that are interested in bruteforce-luks are comparing it to the libraries listed below
Sorting:
- PoC to append and extract data at the end of an ELF file☆20Aug 20, 2017Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Aug 9, 2020Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Mar 18, 2021Updated 4 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago
- An extension for the GitHub Cli application that displays your current contribution graph☆14Aug 3, 2021Updated 4 years ago
- CharmFS backend for Rclone☆15May 3, 2022Updated 3 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Raspberry Pi Pico frequency divider☆14Nov 21, 2021Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 5 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- SSLStrip version to defeat HSTS☆323Sep 21, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Rust implementation of the secret-handshake protocol.☆12Aug 14, 2021Updated 4 years ago
- Ansible role to install beehive https://github.com/muesli/beehive☆12Jun 30, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- A TUI todo app☆14Oct 25, 2020Updated 5 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆24Jun 11, 2025Updated 8 months ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- A shellcode writing toolkit☆684Jun 30, 2025Updated 7 months ago
- Si5351 based WSPR beacon☆15May 26, 2020Updated 5 years ago
- PoC of Imagemagick's Arbitrary File Read☆12Jul 3, 2023Updated 2 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Pizza, delivered straight from the command line.☆12Nov 30, 2015Updated 10 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago