moloch-- / hashlookupLinks
A Python implementation of Crackstion's Hash Lookup
☆26Updated 5 years ago
Alternatives and similar repositories for hashlookup
Users that are interested in hashlookup are comparing it to the libraries listed below
Sorting:
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- ☆102Updated 6 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 7 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- A shellcode testing harness.☆70Updated last year
- Firmware analysis website + API☆43Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- ☆86Updated 10 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆21Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- ☆73Updated 6 years ago
- ☆122Updated 7 years ago
- public exploits☆35Updated 2 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆52Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- simple shellcode generator☆114Updated 8 years ago