Decrypts Cisco VPN Group Passwords
☆18Jan 20, 2012Updated 14 years ago
Alternatives and similar repositories for Cisco-Group-Password-Decrypter
Users that are interested in Cisco-Group-Password-Decrypter are comparing it to the libraries listed below
Sorting:
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- Legacy OS X GLX Implementation (has since been merged into mesa)☆14Oct 17, 2015Updated 10 years ago
- Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execut…☆21May 15, 2021Updated 4 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- Generates IP, while Excluding/Including specific IP blocks. Useful in Mass Scanning.☆24Dec 24, 2014Updated 11 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Oct 13, 2010Updated 15 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Dockerfile for BeEF (the Browser Exploitation Framework) build☆18Mar 8, 2015Updated 11 years ago
- ☆12Apr 8, 2021Updated 4 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆62Aug 12, 2014Updated 11 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆59Dec 15, 2025Updated 2 months ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Mar 13, 2014Updated 11 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- Customisable PCAP parser and research assistant☆26Jan 8, 2018Updated 8 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆28Jul 24, 2017Updated 8 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- runtime spy elf with android/linux and macho with macOS/IOS☆36Mar 31, 2017Updated 8 years ago
- ☆54Feb 23, 2018Updated 8 years ago
- An active network monitor tool☆26Aug 2, 2019Updated 6 years ago
- JReversePro Java Decompiler☆85Apr 26, 2021Updated 4 years ago
- Taggant System developed by the Malware Working Group of ICSG (Industry Connections Security Group) under the umbrella of IEEE☆34Jan 10, 2018Updated 8 years ago
- Mac menubar app to monitor daily keystrokes and trends☆14Mar 26, 2021Updated 4 years ago
- Irolyn is a jailbreak repo extractor for iOS 18 to iOS 18.5 and iPadOS 18 to iPadOS 18.5 .☆13May 15, 2025Updated 9 months ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Apr 24, 2019Updated 6 years ago
- LackeyCCG plugin for Star Wars: Trading Card Game☆12Updated this week
- Connect to Cisco AnyConnect VPN and open a Microsoft Remote Desktop (RDP) window☆11Aug 9, 2023Updated 2 years ago
- an opensource clone of Earthcore: Shattered Elements☆10Jan 27, 2023Updated 3 years ago
- Excel sheet for computing expected damage and point efficiency in Warhammer 40k 9th edition☆11Sep 23, 2025Updated 5 months ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- ☆13Feb 12, 2022Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago