mferland / libzcLinks
Crack legacy zip files using plaintext, bruteforce or dictionary attacks.
☆50Updated 7 months ago
Alternatives and similar repositories for libzc
Users that are interested in libzc are comparing it to the libraries listed below
Sorting:
- Red Login: SSH Brute-force Tools☆104Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Spectre exploit☆55Updated 7 years ago
- A tool library for searching your leaked sourcecode on github☆20Updated last month
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- A Framework for Comparing Password Guessing Strategies☆127Updated 6 years ago
- Holding place for my security and threat news RSS list☆13Updated 7 months ago
- arp-poison (aka arp spoof) tool☆41Updated 12 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆19Updated 7 years ago
- Python Time Based Authentication Attack Tool☆22Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆124Updated 7 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 9 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- A high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt an…☆30Updated 5 years ago
- Multi-threaded web application directory bruteforcer☆27Updated 6 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆50Updated last year
- Code examples from recent blog posts by minerva labs.☆45Updated 6 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- ARP ping detector on local network☆15Updated 12 years ago
- CVE-2017-5721 Proof-of-Concept☆17Updated 7 years ago