kholia / RC4-40-brute-pdfView external linksLinks
Guaranteed cracking of PDF files using RC4 40-bit encryption
☆20Dec 9, 2012Updated 13 years ago
Alternatives and similar repositories for RC4-40-brute-pdf
Users that are interested in RC4-40-brute-pdf are comparing it to the libraries listed below
Sorting:
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- POC for leaking java version through file and ftp protocols☆24Nov 1, 2020Updated 5 years ago
- Arduino Pro Mini 3.3v Ultra Low Power with internal Clock at 1MHz and BOD disabled, easy to install☆27Mar 23, 2016Updated 9 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Oct 27, 2013Updated 12 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 8 months ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- 直接在桌面顯示彈幕 Display bullet screen directly on the desktop☆10Jan 22, 2026Updated 3 weeks ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- Nothing interesting to see here. Old hack on the nfc-tools code, mirror of http://nfc-tools.googlecode.com/svn/trunk — see README.md for …☆51Jul 30, 2020Updated 5 years ago
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 11 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- android got hook under version 5.0☆12Jun 13, 2019Updated 6 years ago
- Pure-Perl OpenPGP implementation☆18Jul 28, 2017Updated 8 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆12Nov 11, 2015Updated 10 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 11 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Toolbox to obfuscate Strings in a Swift Project☆14Updated this week
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 3 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 7 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- android 各种加密算法hook工具☆12Apr 8, 2016Updated 9 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 6 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago