hashstation / zip2hashcatLinks
☆27Updated 5 months ago
Alternatives and similar repositories for zip2hashcat
Users that are interested in zip2hashcat are comparing it to the libraries listed below
Sorting:
- ☆75Updated 3 years ago
- Werkzeug password cracker☆18Updated 9 months ago
- Bruteforce Keepass databases (KDBX 4.x format)☆114Updated last year
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆138Updated 3 weeks ago
- A reverse shell for Windows and Linux written in C.☆77Updated 3 years ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆676Updated last year
- Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH in PEM and DER formats.☆123Updated last week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 8 months ago
- PoC for CVE-2024-48990☆99Updated 9 months ago
- ☆122Updated 2 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆525Updated 10 months ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆40Updated 10 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆261Updated last month
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆292Updated last month
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆181Updated 5 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Extract phone numbers from an audio recording of the dial tones.☆304Updated last year
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆109Updated 4 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆91Updated 2 years ago
- A toolbox for extracting RSA private keys from public keys.☆187Updated 3 years ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆137Updated last year
- A basic python program to obfuscate c/c++ source files.☆111Updated 5 years ago
- Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.☆138Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆159Updated last year
- A webshell plugin and interactive shell for pentesting a Joomla website.☆55Updated 3 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- ☆233Updated 11 months ago
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆409Updated last month