mufeedvh / pdfripLinks
A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks.
☆1,227Updated last year
Alternatives and similar repositories for pdfrip
Users that are interested in pdfrip are comparing it to the libraries listed below
Sorting:
- Automated decoding of encrypted text without knowing the key or ciphers used☆759Updated this week
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,699Updated last month
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,658Updated this week
- 🚀 Caido releases, wiki and roadmap☆1,675Updated last week
- The fastest way to identify anything!☆1,020Updated last year
- Tool and framework for securely reading untrusted USB mass storage devices.☆350Updated 2 weeks ago
- 🐙 Track down GitHub users.☆927Updated 3 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,161Updated 3 months ago
- Find the password of protected ZIP files.☆409Updated last week
- Hash type identifier (CLI & lib)☆890Updated last week
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆750Updated 7 months ago
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆329Updated 6 months ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆370Updated 2 years ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,176Updated 3 weeks ago
- A rewrite of YARA in Rust.☆836Updated this week
- A curated list of tools officially presented at Black Hat events☆621Updated last month
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆769Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- ☆392Updated 3 weeks ago
- Steganalysis web platform☆661Updated 2 weeks ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,907Updated last month
- Original PoC for CVE-2023-32784☆646Updated last year
- Phishing with a fake reCAPTCHA☆587Updated 10 months ago
- Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH in PEM and DER formats.☆123Updated this week
- Uncover the true IP address of websites safeguarded by Cloudflare & Others☆1,885Updated 3 months ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,003Updated last month
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,477Updated 2 months ago
- Header Exploitation HTTP☆626Updated 3 weeks ago
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀☆1,686Updated 3 weeks ago
- secator - the pentester's swiss knife☆1,127Updated this week