☆14Jan 16, 2023Updated 3 years ago
Alternatives and similar repositories for extractor
Users that are interested in extractor are comparing it to the libraries listed below
Sorting:
- ☆49Feb 10, 2024Updated 2 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 8 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A fluent SQLite Query API for Android☆20Jun 12, 2016Updated 9 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- ☆16Apr 1, 2022Updated 3 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- AES GCM : Authenticated Encryption with Associated Data (AEAD) algorithm in Go language☆11Jan 5, 2016Updated 10 years ago
- ASP.NET Core 2 Template for React Site using ES6.☆10Aug 22, 2018Updated 7 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- A wrapper library around native windows sytem APIs☆10Dec 23, 2019Updated 6 years ago
- NodeJS Active Directory authentication and tools.☆11Apr 22, 2023Updated 2 years ago
- A docker for redis master-slave configuration and sentinels for high availability, all in a single container.☆12Oct 1, 2021Updated 4 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Analysis of Hearthstone replays☆11May 18, 2017Updated 8 years ago
- MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.☆16Nov 25, 2015Updated 10 years ago
- ABAP CI using Postman☆14Jan 10, 2019Updated 7 years ago
- ☆12Sep 21, 2021Updated 4 years ago
- My website☆13Jan 24, 2026Updated last month
- ☆17Mar 6, 2025Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- NestJs package starter template☆21Jan 4, 2023Updated 3 years ago
- An example of how to use babel-ui5-plugin with Babel 6.☆13Jun 4, 2016Updated 9 years ago
- Tesseract bindings for .NET☆14Oct 11, 2022Updated 3 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- Simple module to retrive a list of Facebook friends, and when they were last online☆16Feb 19, 2017Updated 9 years ago
- On-device Android forensics tookit☆33Feb 19, 2026Updated last month
- Get call log details after ending call☆15Jan 2, 2015Updated 11 years ago
- Endgame: Singularity Windows binaries for download☆14Sep 26, 2016Updated 9 years ago