Desktop application to unlock Microsoft Office password protected files.
☆40Jun 17, 2022Updated 3 years ago
Alternatives and similar repositories for craXcel-desktop
Users that are interested in craXcel-desktop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dockerized deployment of Polr URL shortener☆10Mar 15, 2022Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 5 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- CemuLauncher - A custom Launcher for Cemu with advanced features.☆15Aug 18, 2021Updated 4 years ago
- MCP server for retrieving relevant documentation from a knowledge base☆14Mar 3, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Deploy (WPF + runspaces) GUI to execute any script or distribute files to remote computers☆13Sep 25, 2024Updated last year
- Chrome Extension☆14Oct 24, 2022Updated 3 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- i summarize found scripts here☆15Jan 10, 2022Updated 4 years ago
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- ☆19Oct 20, 2021Updated 4 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Devover Hacktoberfest Event☆21Mar 21, 2023Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Back up and parse Google Chrome's Bookmarks.bak file☆22Jul 28, 2017Updated 8 years ago
- Kernel for Alioth devices based on Xiaomi SM8250 with Nethunter support☆18Feb 18, 2024Updated 2 years ago
- phishing using wifi method - create fake wifi to dump social media password☆22Apr 17, 2025Updated last year
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 4 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- GUI for regripper☆11Mar 19, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Field guide to gather low-hanging fruits☆15Mar 20, 2025Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- Config files for my GitHub profile.☆27Feb 21, 2023Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- My Linux profiles built for Volatility 2/3☆11Oct 11, 2025Updated 6 months ago
- ☆11Dec 9, 2025Updated 5 months ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆12Jun 19, 2025Updated 10 months ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Dec 14, 2021Updated 4 years ago
- ☆12Nov 8, 2023Updated 2 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 5 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago