Ciphey / Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
☆18,507Updated 9 months ago
Alternatives and similar repositories for Ciphey:
Users that are interested in Ciphey are comparing it to the libraries listed below
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,757Updated last year
- An HTTP toolkit for security research.☆6,174Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,041Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆13,507Updated last month
- Rich is a Python library for rich text and beautiful formatting in the terminal.☆50,332Updated last month
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,000Updated this week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9,340Updated this week
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,535Updated 3 years ago
- An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.☆45,198Updated last week
- Adversary Emulation Framework☆8,782Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,788Updated 10 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,608Updated 6 months ago
- Free and Open Source Reverse Engineering Platform powered by rizin☆16,073Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆29,869Updated 2 months ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆46,602Updated this week
- A fast TCP/UDP tunnel over HTTP☆14,039Updated 3 months ago
- Attack Surface Management Platform☆8,313Updated 2 weeks ago
- A little tool to play with Windows security☆19,696Updated 6 months ago
- Exploitation Framework for Embedded Devices☆12,300Updated this week
- Reverse Engineer's Toolkit☆4,869Updated 9 months ago
- In-depth attack surface mapping and asset discovery☆12,322Updated 3 weeks ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆3,913Updated 2 weeks ago
- 🕵️♂️ Offensive Google framework.☆15,980Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11,832Updated 4 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,308Updated last year
- A swiss army knife for pentesting networks☆8,542Updated last year
- A Workflow Engine for Offensive Security☆5,430Updated 7 months ago
- 🤖 The Modern Port Scanner 🤖☆15,324Updated this week
- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️☆5,836Updated 3 weeks ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆11,674Updated last week