trietptm / Crackme-collections
Crackme collections
☆15Updated 4 years ago
Alternatives and similar repositories for Crackme-collections:
Users that are interested in Crackme-collections are comparing it to the libraries listed below
- C & Shellcode Playground..☆11Updated 7 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆11Updated last month
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 3 years ago
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- Files related to my training classes☆15Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- ☆7Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- A simple AES malware crypter☆16Updated 6 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- ☆13Updated 4 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated last month
- Collection of cracked malware☆14Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Updated 6 years ago
- ☆18Updated 4 years ago