mferland / libzcLinks
Crack legacy zip files using plaintext, bruteforce or dictionary attacks.
☆50Updated last year
Alternatives and similar repositories for libzc
Users that are interested in libzc are comparing it to the libraries listed below
Sorting:
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Updated 3 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago
- Spectre exploit☆55Updated 8 years ago
- Python Time Based Authentication Attack Tool☆21Updated 4 years ago
- Collection of XSS Payloads from various sources☆29Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆167Updated 7 years ago
- Holding place for my security and threat news RSS list☆15Updated last year
- Reverse shell and rootkit☆19Updated 8 years ago
- A high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt an…☆31Updated 5 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- hashkill password recovery tool☆198Updated 12 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 6 years ago
- Meltdown PoC for reading passwords from Google Chrome.☆471Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- Dependencies for Veil 3☆17Updated 9 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Updated 7 years ago
- Heartbleed test script for OpenVPN☆34Updated 11 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 9 years ago
- Tools for encryption, decryption and cracking from several cryptographic systems.☆39Updated 2 years ago
- ☆35Updated 13 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Updated 6 years ago
- Webkit uxss exploit (CVE-2017-7089)☆63Updated 8 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 8 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Updated 3 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 8 years ago
- A Framework for Comparing Password Guessing Strategies☆129Updated 6 years ago