nccgroup / Untrue
Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.
☆41Updated 7 years ago
Alternatives and similar repositories for Untrue:
Users that are interested in Untrue are comparing it to the libraries listed below
- ☆27Updated 7 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆24Updated 10 years ago
- ☆15Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- ☆25Updated 8 years ago
- post-exploitation tools☆15Updated 6 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆26Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- ☆14Updated 5 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 9 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- CANAPE Network Testing Tool☆32Updated 6 years ago