KeePass 2.X dumper (CVE-2023-32784)
☆27Nov 4, 2023Updated 2 years ago
Alternatives and similar repositories for keepass_dump
Users that are interested in keepass_dump are comparing it to the libraries listed below
Sorting:
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Dec 21, 2022Updated 3 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Python script to clean temp files and older versions from Snap for 42 students.☆11Jan 10, 2025Updated last year
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- FPGA core for ISO7816 smart card communication☆13Apr 28, 2022Updated 3 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- An animated monochrome UI template based on the u8g2lib☆23Feb 22, 2026Updated last week
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- somthing about Cobaltstrike☆48Aug 28, 2022Updated 3 years ago
- dcsync bof☆44Feb 13, 2026Updated 2 weeks ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- ☆16Sep 12, 2025Updated 5 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 10 months ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- ☆15May 30, 2025Updated 9 months ago