unicornsasfuel / keybruteLinks
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
☆28Updated 6 years ago
Alternatives and similar repositories for keybrute
Users that are interested in keybrute are comparing it to the libraries listed below
Sorting:
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- eXtremely fast data eXtraction via blind SQL injection☆15Updated 12 years ago
- Methods of C2☆21Updated 9 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆13Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- ☆15Updated 2 years ago
- ☆11Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- Public exploits☆14Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆52Updated 7 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- ☆20Updated 5 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago