ptoomey3 / Cisco-Group-Password-Decrypter
Decrypts Cisco VPN Group Passwords
☆16Updated 12 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cisco-Group-Password-Decrypter
- Service desk password tools.☆15Updated 7 years ago
- Format string exploit generation☆9Updated 9 years ago
- ☆15Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Collection of cracked malware☆14Updated 5 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Alienvault Labs Projects Random Stuff☆16Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 5 years ago
- IP Address Listing Tool☆11Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Lansweeper Password Recovery Tool☆11Updated 8 years ago
- ☆23Updated 11 years ago
- PoC code for crashing windows active directory☆34Updated 6 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- A simple Shellshock scanner in python☆41Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆11Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 7 years ago