ab_decrypt.py, an educational python tool to decrypt Android backups
☆49Mar 12, 2022Updated 3 years ago
Alternatives and similar repositories for ab_decrypt
Users that are interested in ab_decrypt are comparing it to the libraries listed below
Sorting:
- /ˈhäjˌpäj/ "a confused mixture."☆13Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- vPICdisasm is a Microchip PIC disassembler for Baseline, Mid-Range, and Mid-Range Enhanced 8-bit PIC cores.☆20Apr 4, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- GitHub Actions for MobSF☆26Apr 24, 2024Updated last year
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 7 months ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 6 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- A Gstreamer decryptor, with an implementation for OCDM.☆12Jun 7, 2022Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices☆160May 21, 2020Updated 5 years ago
- A local scanner for vulnerable web applications☆41Feb 10, 2026Updated last month
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- A security plug-in in Xcode plus a Clang Static Analyzer Checkers for iOS application development. This plug-in aims to reduce the vulner…☆68Feb 5, 2015Updated 11 years ago
- ☆15Sep 4, 2024Updated last year
- ☆14May 13, 2020Updated 5 years ago
- Autonomous Rescue Robot☆17Nov 16, 2022Updated 3 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆16Jul 30, 2022Updated 3 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- Linux clone of TheDraw ANSI drawing program (imported from https://www.cs.helsinki.fi/u/penberg/newdraw/)☆11May 5, 2018Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Rust bindings for the Android MediaCodec NDK library☆13Nov 7, 2022Updated 3 years ago
- Makes a video of collages☆11Feb 12, 2023Updated 3 years ago
- Demo: https://diafygi.github.io/myLock/☆16Jul 28, 2014Updated 11 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- FeliCaの残高を読み取るAndroidアプリ☆12May 10, 2018Updated 7 years ago