misterch0c / fishextract
Fish shell plugin to extract (almost) any kind of archives
☆10Updated 9 years ago
Alternatives and similar repositories for fishextract
Users that are interested in fishextract are comparing it to the libraries listed below
Sorting:
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Network white noise collector☆19Updated 9 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- Collection of cracked malware☆14Updated 6 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Disassembler Library for x86 and x86-64☆8Updated 10 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Linux Code Injection Toolkit - Code interposition for Linux☆19Updated 14 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Updated 6 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 6 months ago
- The Rex Socket Abstraction Library☆12Updated last month
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- sudo almost as fake as your ma☆16Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- recon framework in ruby☆13Updated 13 years ago
- Grab functions from radare2☆10Updated 8 years ago
- Script for searching the extracted firmware file system for goodies!☆9Updated 9 years ago