scripts to create zip bombs
☆12Nov 26, 2012Updated 13 years ago
Alternatives and similar repositories for zip-bomb
Users that are interested in zip-bomb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Mar 2, 2014Updated 12 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- This plugin sends Push messages (notifications) from the Headwind MDM web panel to mobile devices.☆15Jan 7, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime…☆12Sep 10, 2020Updated 5 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- WiFi Manager for Android - Headwind MDM Plugin. Manage WiFi connections, setup passwords, enable and disable networks from the web panel.☆19Mar 5, 2026Updated 3 weeks ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- Bottom sheet component purely in JS for react native☆12Jan 13, 2023Updated 3 years ago
- Zello PTT (Push to Talk) android app. This is Android sourcecode decompiled from APK. the APK is provided as a release. This repository w…☆11Jun 20, 2017Updated 8 years ago
- Dockerized version of Uwazi (“openness" in Swahili). HURIDOCS designed Uwazi to make human rights information more open and accessible to…☆13Jul 30, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Kismet Plugin to extend the Web UI and enable configuration to send Kismet device data to ATAK. Works only for "Release" version of kisme…☆15Sep 16, 2024Updated last year
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- L.I.A.M is an open source case management system for digital forensics labs. Law-Enforcement Investigations and Asset Management☆13Jul 4, 2025Updated 8 months ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- ☆19Jul 4, 2017Updated 8 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- Tools to install and run a production-quality Docker private registry on Azure.☆13Jul 14, 2014Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- command-line CoT/TAK TCP server☆23May 11, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 6 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆30Nov 8, 2012Updated 13 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- ATAK Plugin to grab RSSI values from local Access Points and try to guess where they are.☆21Jun 7, 2024Updated last year
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- The obligatory dotfiles repo.☆14Jan 25, 2026Updated 2 months ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- A lightweight web crawler and interactive network visualizer which maps the relationship between a website’s internal pages and the exter…☆18Mar 2, 2026Updated 3 weeks ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago