DarkWolf-Labs / ft-crackLinks
☆19Updated last year
Alternatives and similar repositories for ft-crack
Users that are interested in ft-crack are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆108Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last week
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆65Updated last month
- DJI Drone Control Hijacking☆37Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Updated 3 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- top usernames from azure survey 2025☆14Updated 8 months ago
- Force target victim to unsafe network☆29Updated 6 months ago
- F5 Service Password Decryption☆29Updated 4 months ago
- Living Under the Land on Linux ~ BSides Belfast 2025☆37Updated last month
- Top hashpwn rules☆20Updated 2 weeks ago
- A simulation of the RFCTF KOTH game.☆10Updated 5 years ago
- Legba recipes.☆51Updated last year
- A user enumeration tool for Slack.☆34Updated last year
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆94Updated last month
- ☆26Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 3 weeks ago
- ☆37Updated 5 years ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆21Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- Purpose-built Red Team network hardware implant made from common components.☆26Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 3 months ago
- Web File Manager☆12Updated 4 months ago