nlitsme / zipdumpLinks
Analyze zipfile, either local, or from url
☆35Updated 9 months ago
Alternatives and similar repositories for zipdump
Users that are interested in zipdump are comparing it to the libraries listed below
Sorting:
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 11 months ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- ☆20Updated 4 years ago
- Digital Forensics date and time☆24Updated 6 months ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Updated last week
- Windows SSPI wrapper in prue python☆15Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 4 months ago
- Rex library for various exploitation helpers☆22Updated 2 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Local Privilege Escalation Miner☆27Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- module for certexfil☆15Updated 3 years ago
- List of whitepapers and documents on cyber operations and intelligence/national security matters.☆11Updated 4 years ago
- ☆16Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 6 months ago
- Collect autorun records from running system☆60Updated 3 years ago