This PowerShell Script is used to unprotect EXCEL file without a password
☆21Aug 15, 2017Updated 8 years ago
Alternatives and similar repositories for UnprotectExcel
Users that are interested in UnprotectExcel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- This program is a utility that reads the internal information of Windows Subsystem for Linux from the system and outputs the data to a st…☆12Dec 8, 2022Updated 3 years ago
- Build cool Dialogs with PowerShell and WPF☆19Aug 13, 2019Updated 6 years ago
- Elastic Enterprise Search Official PHP Client☆25Feb 4, 2026Updated last month
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- A library for creating wrappers around command-line programs.☆32Oct 6, 2022Updated 3 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Tutorial to write qemu plugins☆34Jun 22, 2017Updated 8 years ago
- Domaintools addon for Maltego☆15Sep 13, 2012Updated 13 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- Tutorial on executing system commands within Obsidian using Templater and user definied functions.☆14Mar 12, 2023Updated 3 years ago
- Cracking PDF password protection via hashcat.☆15Dec 24, 2025Updated 3 months ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- USB Rubber Ducky Wiki☆11Jan 18, 2019Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- A user-mode network ("slirp") CNI plugin - container networking for unprivileged users☆18Nov 17, 2018Updated 7 years ago
- 🐥 Digital Rubber Ducky Extension for Mac☆14May 10, 2017Updated 8 years ago
- A web-scraping interface to various Google Services.☆34Apr 27, 2012Updated 13 years ago
- Malice VirusTotal Plugin☆12Feb 24, 2019Updated 7 years ago
- FUSE based AES-CBC encrypted filesystem and encryption tool☆11Nov 12, 2017Updated 8 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- An indoor positioning system running on WiFi access points.☆11Mar 24, 2018Updated 8 years ago
- Hash passwords with the most costly Argon2 hash possible☆20Aug 7, 2022Updated 3 years ago
- Some microbenchmarks and design docs before commencement☆11Feb 1, 2021Updated 5 years ago
- Automations is a Ruby 1.9 project consisting of libraries to fake and simulate (automate) user input like pressing keys or moving windows…☆30Sep 25, 2011Updated 14 years ago
- Do RIPE Atlas traceroutes from networks with significant user populations in a country☆13Jun 20, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- A very powerful tool for All kind of MITM attacks☆15Sep 7, 2023Updated 2 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Feb 28, 2017Updated 9 years ago
- Security challenges and CTFs created by the Penultimate team.☆14Feb 22, 2018Updated 8 years ago
- Automating and Enhancing Nmap using Python☆17Apr 18, 2018Updated 7 years ago