unicornsasfuel / keybrute
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
☆27Updated 6 years ago
Alternatives and similar repositories for keybrute:
Users that are interested in keybrute are comparing it to the libraries listed below
- Exfiltration based on custom X509 certificates☆26Updated 10 months ago
- Methods of C2☆21Updated 9 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆23Updated 6 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago
- ☆22Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Shock the shell! Exploit many injection method for shellshock☆17Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 5 years ago
- Stupid simple XOR encryption utility☆33Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 4 years ago
- various slides and presentations I've worked on☆18Updated 10 months ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆13Updated 4 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- This is a concept poc of command and control server implemented over blockchain☆47Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- ☆11Updated 2 years ago
- ☆13Updated 4 years ago
- ☆43Updated 5 years ago