Cisco Type 7 Password Decrypter
☆128Jun 21, 2023Updated 2 years ago
Alternatives and similar repositories for ciscot7
Users that are interested in ciscot7 are comparing it to the libraries listed below
Sorting:
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- a recommendation list of math courses for people with no math background.☆11Mar 2, 2021Updated 5 years ago
- C programming example codes.☆10Apr 30, 2021Updated 4 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Proof of Concept code of the Shoplift code☆41Oct 4, 2021Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- pentest tools☆41Sep 4, 2017Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- React library for Spotify codes☆11Mar 6, 2021Updated 5 years ago
- penetration testing utilities☆10Mar 30, 2021Updated 4 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- Data structure and algorithms in C and C++.☆10Jun 2, 2021Updated 4 years ago
- Template to get you started in a dev environment with next/typescript/tailwind☆10Jan 6, 2023Updated 3 years ago
- A python library to automate time-based blind SQL injection☆49Sep 15, 2019Updated 6 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- README☆10Updated this week
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- OSED course preparation materials.☆15May 27, 2021Updated 4 years ago
- code for my video guide about raycasting https://www.youtube.com/watch?v=DFZnzCbmlng☆10Jan 18, 2021Updated 5 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Telegram Bug Bounty Bot☆32Jan 3, 2017Updated 9 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- Cisco Config Analysis Tool☆467Apr 23, 2023Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Jan 5, 2026Updated 2 months ago
- ☆14Nov 21, 2022Updated 3 years ago
- BFSG - BruteForce String Generator 😾☆14May 11, 2023Updated 2 years ago
- WinGPG is a tray-based classical Windows application, Windows NT Explorer shell extension, and a classic GPGv2 distribution. Secure your …☆13Jul 31, 2021Updated 4 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 3 years ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago