kholia / RC4-40-brute-officeView external linksLinks
Guaranteed cracking of M$ Office files using RC4 40-bit encryption
☆81Aug 4, 2017Updated 8 years ago
Alternatives and similar repositories for RC4-40-brute-office
Users that are interested in RC4-40-brute-office are comparing it to the libraries listed below
Sorting:
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- ☆10Feb 18, 2016Updated 9 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆17Sep 10, 2023Updated 2 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- [deprecated] see README☆42May 15, 2020Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- Tool to resolve symbols by the address of the binary☆15Sep 21, 2018Updated 7 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 5 years ago
- .NET executable packer☆62Nov 4, 2018Updated 7 years ago
- ☆68Aug 19, 2014Updated 11 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Dec 16, 2023Updated 2 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- A Java library for working with Ascii85, also called Base85 - a form of binary-to-text encoding☆18Oct 13, 2020Updated 5 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- ☆20Sep 23, 2018Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 2 months ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- ☆18Mar 26, 2024Updated last year
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 10, 2026Updated last week
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago