kholia / PGPCrack-NGLinks
PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.
☆24Updated 7 years ago
Alternatives and similar repositories for PGPCrack-NG
Users that are interested in PGPCrack-NG are comparing it to the libraries listed below
Sorting:
- ☆26Updated 5 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- ☆23Updated 11 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Oracle Attacks Tool☆13Updated 9 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Updated 11 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Breaking the security of Microsoft's RMS☆55Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 12 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Updated 2 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 5 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆46Updated 10 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆62Updated 12 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Exfiltrate data over screen interfaces☆58Updated 7 years ago
- Communicate with a remote shell easily☆12Updated 7 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago