Certificate extraction tool for Windows
☆130Dec 18, 2014Updated 11 years ago
Alternatives and similar repositories for jailbreak-Windows
Users that are interested in jailbreak-Windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Jailbreak☆536Sep 9, 2022Updated 3 years ago
- ☆81Aug 1, 2016Updated 9 years ago
- Utility tool to help digitally sign applications (binaries) on Windows.☆13Jun 8, 2015Updated 10 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆123Mar 3, 2013Updated 13 years ago
- icloud bypass developed by s1a73r5☆11Dec 30, 2019Updated 6 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- iDevice Jailbreak Utilities☆20Dec 31, 2010Updated 15 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Sep 14, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Common Utils library is developed to reduce efforts to achieve common features of the android apps. While developing the apps, we realize…☆18Feb 23, 2015Updated 11 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- Automate tracks download from Deezer☆11Jun 29, 2015Updated 10 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A password generation inspired by xkcd☆18Oct 30, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 10 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- Spam trap management☆24Jun 18, 2024Updated last year
- [Android] System Tweaker FREE app sources☆10Mar 25, 2018Updated 8 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- Presentation and resources for my 2017 PowerShell Summit 'Mocking' presentaiton☆13Apr 11, 2017Updated 9 years ago
- TLS SNI virtual hosts bruteforcer☆22Aug 26, 2014Updated 11 years ago
- A serverless application for publishing and subscribing to AWS IoT topics using AWS Lambda and IoT Rules☆10Jan 29, 2026Updated 2 months ago
- ☆26Feb 7, 2025Updated last year
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Tools for stress testing applications.☆12Sep 20, 2020Updated 5 years ago