Guaranteed cracking of PDF files using RC4 40-bit encryption
☆20Dec 9, 2012Updated 13 years ago
Alternatives and similar repositories for RC4-40-brute-pdf
Users that are interested in RC4-40-brute-pdf are comparing it to the libraries listed below
Sorting:
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- POC for leaking java version through file and ftp protocols☆24Nov 1, 2020Updated 5 years ago
- Arduino Pro Mini 3.3v Ultra Low Power with internal Clock at 1MHz and BOD disabled, easy to install☆27Mar 23, 2016Updated 9 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Sep 1, 2025Updated 6 months ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Oct 27, 2013Updated 12 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 9 months ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- 直接在桌面顯示彈幕 Display bullet screen directly on the desktop☆10Mar 2, 2026Updated last week
- Small and cheap standalone USB sanitizer☆44Mar 5, 2021Updated 5 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- android 各种加密算法hook工具☆12Apr 8, 2016Updated 9 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 9 years ago
- android got hook under version 5.0☆12Jun 13, 2019Updated 6 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Pure-Perl OpenPGP implementation☆18Jul 28, 2017Updated 8 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 12 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆12Nov 11, 2015Updated 10 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 11 years ago
- 跟踪objc_msgSend(Track objc_msgSend)☆16Oct 18, 2021Updated 4 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Toolbox to obfuscate Strings in a Swift Project☆14Feb 12, 2026Updated 3 weeks ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago