unicornsasfuel / keybruteLinks
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
☆27Updated 6 years ago
Alternatives and similar repositories for keybrute
Users that are interested in keybrute are comparing it to the libraries listed below
Sorting:
- Word split utility☆13Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 6 years ago
- Python script to automatically deobfuscate malware code☆59Updated 7 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 9 months ago
- Data exfiltration using reflective DNS resolution covert channel☆53Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- HashCobra Hash Cracking tool.☆122Updated 4 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Methods of C2☆21Updated 10 years ago
- DNS File EXfiltration☆46Updated last year
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for it…☆14Updated 9 years ago
- ☆15Updated 2 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆26Updated 6 years ago