mferland / libzcLinks
Crack legacy zip files using plaintext, bruteforce or dictionary attacks.
☆51Updated 8 months ago
Alternatives and similar repositories for libzc
Users that are interested in libzc are comparing it to the libraries listed below
Sorting:
- ld_preload userland rootkit☆35Updated 4 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Python Time Based Authentication Attack Tool☆22Updated 4 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆35Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- Spectre exploit☆55Updated 7 years ago
- ☆35Updated 13 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆33Updated 6 years ago
- A collection of shellcodes☆70Updated 13 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Updated 3 years ago
- Red Login: SSH Brute-force Tools☆105Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 7 years ago
- Tools for encryption, decryption and cracking from several cryptographic systems.☆37Updated 2 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- VirtualBox Disk Image Encryption password cracker☆32Updated 10 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆65Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- ☆17Updated 6 years ago
- All-in-one, portable, collection of general-purpose cryptography tools☆48Updated 6 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago