unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives
☆97Nov 10, 2018Updated 7 years ago
Alternatives and similar repositories for unarcrypto
Users that are interested in unarcrypto are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 2 months ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Grep-like WinDbg extension☆45Apr 7, 2017Updated 8 years ago
- SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy…☆13Oct 20, 2017Updated 8 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆140May 25, 2017Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37May 11, 2015Updated 10 years ago
- phpAudit is a simple shell script that scans PHP files for possible security risks.☆26Apr 7, 2013Updated 12 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Jun 23, 2017Updated 8 years ago
- Full-bin indexation of binary files☆91May 19, 2018Updated 7 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- A MS OpenXML Format Fuzzing Framework☆84Apr 10, 2018Updated 7 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Landing page for MAEC docs☆22Oct 22, 2022Updated 3 years ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆38Feb 24, 2026Updated last week
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- Set of tools to analyze Tinynuke samples☆15Nov 18, 2021Updated 4 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago