unicornsasfuel / keybruteLinks
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
☆26Updated 7 years ago
Alternatives and similar repositories for keybrute
Users that are interested in keybrute are comparing it to the libraries listed below
Sorting:
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Word split utility☆13Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- This is a concept poc of command and control server implemented over blockchain☆54Updated 6 years ago
- Python script to automatically deobfuscate malware code☆59Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- DNS File EXfiltration☆45Updated last year
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ☆15Updated 2 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- HashCobra Hash Cracking tool.☆122Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Screenshot Shenanigans☆26Updated 8 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- ☆23Updated 7 years ago
- Methods of C2☆21Updated 10 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆55Updated last year