kholia / RC4-40-brute-pdf
Guaranteed cracking of PDF files using RC4 40-bit encryption
☆19Updated 12 years ago
Alternatives and similar repositories for RC4-40-brute-pdf:
Users that are interested in RC4-40-brute-pdf are comparing it to the libraries listed below
- ☆10Updated 3 years ago
- ☆12Updated 5 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆26Updated last year
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- ☆24Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆11Updated 7 years ago
- Application Security library☆11Updated 12 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- A MBR Fuzzer☆29Updated last year
- Automated Payload Test Controller☆9Updated 7 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- ☆10Updated 7 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago
- Registry timestamp manipulation☆16Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 2 weeks ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Man in the middle for NLA enabled RDP in python☆14Updated 3 years ago
- A privilege escalation detection and prevention system for GNU/Linux hosts☆12Updated 12 years ago
- Tools for analyzing Windows containers and break container's isolation☆29Updated 2 years ago
- ☆11Updated 6 years ago