Guaranteed cracking of PDF files using RC4 40-bit encryption
☆20Dec 9, 2012Updated 13 years ago
Alternatives and similar repositories for RC4-40-brute-pdf
Users that are interested in RC4-40-brute-pdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Mar 24, 2015Updated 11 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Made VRChat Avatar creation and testing easier☆10Dec 28, 2022Updated 3 years ago
- ☆16May 9, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Pure-Perl OpenPGP implementation☆18Jul 28, 2017Updated 8 years ago
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 12 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Oct 27, 2013Updated 12 years ago
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- Generates a binary file from a list of bitmaps. It is written to optimize the transfer of data from MCU memory to Nokia 5110/3310 display…☆11Dec 24, 2014Updated 11 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Python with a twist of R syntax☆10May 6, 2019Updated 6 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- An embedded bus adapter for various microcontrollers and radios.☆16Dec 16, 2014Updated 11 years ago
- A C# irc bot malware POC.☆12Jul 29, 2014Updated 11 years ago
- ☆12Feb 20, 2022Updated 4 years ago
- Q# is a C# to C++ compiler using the Qt library for the classlib☆20Aug 16, 2018Updated 7 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- ☆13Mar 14, 2015Updated 11 years ago
- This repo contains example code which demonstrates how to receive and decode the streamed data of 3D and 2D laser scanners.☆14Sep 27, 2024Updated last year
- Probe Zero project - see Ndh2K16☆13Jul 3, 2016Updated 9 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Sep 1, 2025Updated 7 months ago
- self-hosted Azure OSINT tool☆35Jun 24, 2025Updated 9 months ago
- Arduino sketches and Perl script to program flash on Nordic nRF24LE1 wireless SOC☆18Feb 24, 2015Updated 11 years ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- ☆10Oct 25, 2021Updated 4 years ago
- pretty print Mifare Classic MAD - Mifare Application Directory from dump files☆20Oct 8, 2019Updated 6 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆32Nov 14, 2025Updated 5 months ago
- ☆27Sep 4, 2017Updated 8 years ago
- Tools used by CSIRT and especially in the scope of CNW☆18Feb 26, 2026Updated last month
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆21Dec 3, 2024Updated last year