nlitsme / zipdump
Analyze zipfile, either local, or from url
☆35Updated 7 months ago
Alternatives and similar repositories for zipdump
Users that are interested in zipdump are comparing it to the libraries listed below
Sorting:
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 4 months ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- unbox - Unpack and Decompile the $h*! out of things☆47Updated 7 years ago
- ☆22Updated 4 years ago
- Digital Forensics date and time☆23Updated 4 months ago
- A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast☆7Updated 3 weeks ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- A collection of my public security advisories.☆24Updated 3 weeks ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Truehunter☆31Updated 4 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Updated 2 years ago
- Hybrid Port Knocking System☆22Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- CveXplore☆39Updated last month
- Hash collisions and their exploitations☆9Updated 2 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- ☆14Updated 3 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 months ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago