hannob / zipeinfo
ZIP encryption info
☆30Updated 11 years ago
Alternatives and similar repositories for zipeinfo:
Users that are interested in zipeinfo are comparing it to the libraries listed below
- A Python / Scapy implementation of the OR (TOR) protocol.☆97Updated 3 years ago
- ☆27Updated 7 years ago
- ☆12Updated 8 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- python tor client☆27Updated 9 years ago
- ☆36Updated 12 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆17Updated 10 years ago
- Python bindings for hashcat☆58Updated 5 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- ☆9Updated 7 years ago
- ☆198Updated 9 years ago
- Password analysis software☆37Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- tundeep☆42Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago