hannob / zipeinfoLinks
ZIP encryption info
☆30Updated 3 months ago
Alternatives and similar repositories for zipeinfo
Users that are interested in zipeinfo are comparing it to the libraries listed below
Sorting:
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Python bindings for hashcat☆63Updated 6 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- ☆147Updated 9 years ago
- ☆198Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Password Hash Identification☆222Updated 11 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 8 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- ☆27Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 12 years ago
- ☆102Updated 3 weeks ago
- ☆45Updated 3 months ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Rogue AP killer☆92Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- ☆54Updated 9 years ago
- builds database/visualizations of LAN structure from passively sifted information☆149Updated 11 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆118Updated 7 years ago
- DEPRECATED USE v3!☆59Updated 10 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 11 years ago