unicornsasfuel / keybruteLinks
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
☆26Updated 7 years ago
Alternatives and similar repositories for keybrute
Users that are interested in keybrute are comparing it to the libraries listed below
Sorting:
- This is a concept poc of command and control server implemented over blockchain☆56Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Word split utility☆13Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Python script to automatically deobfuscate malware code☆59Updated 7 years ago
- Methods of C2☆22Updated 10 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ☆17Updated 8 years ago
- ☆15Updated 3 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Updated 8 years ago
- Stupid simple XOR encryption utility☆34Updated 3 months ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 8 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- A Simple PE File Heuristics Scanners☆53Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago