mferland / libzcLinks
Crack legacy zip files using plaintext, bruteforce or dictionary attacks.
☆51Updated 8 months ago
Alternatives and similar repositories for libzc
Users that are interested in libzc are comparing it to the libraries listed below
Sorting:
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Spectre exploit☆55Updated 7 years ago
- Red Login: SSH Brute-force Tools☆105Updated 7 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- A Framework for Comparing Password Guessing Strategies☆127Updated 6 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Python Time Based Authentication Attack Tool☆22Updated 4 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- hashkill password recovery tool☆196Updated 11 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- PHDays Online CTF 2017. Developed with ♥ by Hackerdom team☆22Updated 8 years ago
- This is a PHP command-line script to auto-grab the metasploit 14-DAYs pro trial key.☆61Updated 10 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Seed recovery tool for PRNGs☆41Updated 8 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆19Updated 7 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 10 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 5 years ago
- ☆35Updated 13 years ago
- A high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt an…☆30Updated 5 years ago