misterch0c / fishextract
Fish shell plugin to extract (almost) any kind of archives
☆10Updated 8 years ago
Related projects: ⓘ
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Alienvault Labs Projects Random Stuff☆16Updated 11 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 2 months ago
- Fingerprint server side technology☆28Updated 10 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated last year
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆15Updated 3 years ago
- Identifies Bluetooth Low-energy devices☆15Updated 4 years ago
- Network white noise collector☆17Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- SIP hacking tools and scripts☆23Updated 3 years ago
- Test Suite for John the Ripper☆24Updated 2 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 10 years ago
- Script for searching the extracted firmware file system for goodies!☆9Updated 8 years ago
- ☆2Updated 5 months ago
- This package allows reading and writing bettercap's session recordings.☆15Updated 5 years ago
- Collection of cracked malware☆14Updated 5 years ago
- ☆11Updated this week
- mOrc is a post-exploitation framework for macOS written in Bash☆18Updated last year
- Security Advisories and Researches☆14Updated 10 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Empire is a pure PowerShell post-exploitation agent.☆11Updated 7 years ago
- ☆10Updated this week
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 6 years ago
- Decrypts Cisco VPN Group Passwords☆16Updated 12 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 10 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 8 years ago