kacperszurek / gpg_reaperView external linksLinks
GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory
☆96Mar 7, 2018Updated 7 years ago
Alternatives and similar repositories for gpg_reaper
Users that are interested in gpg_reaper are comparing it to the libraries listed below
Sorting:
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Script to steal passwords from ssh.☆488Dec 19, 2018Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Oct 23, 2015Updated 10 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Nov 30, 2018Updated 7 years ago
- ☆63Mar 21, 2018Updated 7 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆736Feb 5, 2019Updated 7 years ago
- A fully functional DanderSpritz lab in 2 commands☆447May 16, 2019Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated last year
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆116Nov 19, 2017Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆239May 22, 2023Updated 2 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Pastebin OSINT Harvester☆329Apr 27, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- A script that automates generation of OpenSSL reverse shells☆303Sep 24, 2020Updated 5 years ago
- Brute forcer and shell deployer for WildFly☆101Mar 10, 2018Updated 7 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- A tool for finding and analyzing private (and public) key files, including support for Android APK files.☆276Nov 7, 2022Updated 3 years ago