hannob / zipeinfoLinks
ZIP encryption info
☆30Updated last week
Alternatives and similar repositories for zipeinfo
Users that are interested in zipeinfo are comparing it to the libraries listed below
Sorting:
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- ☆199Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- ☆27Updated 8 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Python bindings for hashcat☆61Updated 6 years ago
- Password analysis software☆37Updated 10 years ago
- Password Hash Identification☆220Updated 11 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- a client-only layer of protection from the wiretap/sniff/IDS analysis☆110Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 9 years ago
- Introbackdoors☆50Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 9 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Use security tools from within IRC.☆24Updated 13 years ago
- SCTP network scanner for discovery and security☆94Updated 3 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago