Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE ME!!!
☆312Nov 17, 2021Updated 4 years ago
Alternatives and similar repositories for pemcrack
Users that are interested in pemcrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a mini-firewall that completely isolates a target device from the local network.☆309Nov 11, 2013Updated 12 years ago
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆709Nov 6, 2016Updated 9 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- nmap nse script for web services screenshot☆16Jul 22, 2013Updated 12 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- Web-based WiFi monitor☆68Oct 18, 2022Updated 3 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Jul 5, 2015Updated 10 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆242Feb 8, 2017Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- A scanner for SIP proxies vulnerable to Shellshock☆112Aug 13, 2016Updated 9 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Jun 21, 2017Updated 8 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Mar 6, 2018Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- ☆159Feb 23, 2015Updated 11 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago