willshiao / PatchLinks
ποΈ Retroactively fix your Zoom recordings with a click! Won 1st Place, Best Use of GCP, Best Start-Up, and Best Entrepreneurial Hack at Citrus Hack 2020.
β10Updated 3 years ago
Alternatives and similar repositories for Patch
Users that are interested in Patch are comparing it to the libraries listed below
Sorting:
- CLI tool for PKCS7 padding oracle attacksβ142Updated 4 years ago
- Provides access to libhashcatβ31Updated last year
- macOS Client-Side Phishing lock screen payloadβ129Updated 6 years ago
- A CHaracter Aware Splitting Method for producing password candidates.β43Updated 7 years ago
- SQL injection via bruteforced MD5 hash reflection of random stringsβ53Updated 6 years ago
- Windows 10 De-Clutter scriptβ25Updated 5 years ago
- A tiny set of helper scripts for ipinfoβ17Updated 5 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.β86Updated 4 years ago
- CRIME attack PoC : a compression oracle attacks CVE-2012-4929β30Updated 6 years ago
- Creates dictionaries based on Wikipedia titlesβ63Updated 6 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.β10Updated 7 years ago
- βοΈπ° Network monitoring solution to detect crypto-mining on local machines.β31Updated 7 years ago
- Let's brute force this hotel's tv.β82Updated 6 years ago
- A stand-alone implementation of Hashcat's rule engineβ35Updated 9 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.β13Updated 2 years ago
- Password Breach API Serverβ88Updated 6 months ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL β¦β72Updated 6 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security researβ¦β99Updated last year
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.β¦β15Updated 4 years ago
- An intuitive and encrypted in-memory filesystem (VFS)β101Updated 2 months ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwoβ¦β38Updated 6 years ago
- Rosie the Pivoterβ17Updated 7 years ago
- β15Updated 5 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking serviceβ21Updated 4 years ago
- A golang library designed to interact with Metasploitβ43Updated 4 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Searchβ190Updated 2 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OSβ37Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~β76Updated 5 years ago
- Competition Infrastructure Managementβ88Updated 4 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interfaceβ87Updated 9 months ago