nlitsme / zipdump
Analyze zipfile, either local, or from url
☆33Updated 3 months ago
Alternatives and similar repositories for zipdump:
Users that are interested in zipdump are comparing it to the libraries listed below
- Offline-viewer for registry files☆11Updated 4 months ago
- ☆22Updated 4 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 5 months ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated last year
- module for certexfil☆15Updated 2 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- A rogue DNS detector☆23Updated last year
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Sp00fer blog post -☆25Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Autopsy Module to analyze Registry Hives☆14Updated 2 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A simple way to exfiltrate data using spotify API☆18Updated 2 weeks ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago