DarkWolf-Labs / ft-crackLinks
☆19Updated last year
Alternatives and similar repositories for ft-crack
Users that are interested in ft-crack are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆104Updated 2 years ago
- details about DIAL protocol vulnerabilities☆30Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Legba recipes.☆51Updated last year
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last month
- A user enumeration tool for Slack.☆31Updated last year
- Still point in moving world.☆49Updated 3 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Living Under the Land on Linux ~ BSides Belfast 2025☆33Updated 2 months ago
- ☆26Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆54Updated last week
- top usernames from azure survey 2025☆14Updated 6 months ago
- BINARLY Research Tools and PoCs☆38Updated last year
- A simulation of the RFCTF KOTH game.☆10Updated 5 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 8 months ago
- Force target victim to unsafe network☆29Updated 5 months ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆89Updated 2 weeks ago
- Top hashpwn rules☆21Updated 11 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated 11 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 2 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆83Updated 5 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆82Updated last year
- ☆11Updated 4 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Phone bluetooth suite that can track and prompt user notification☆17Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- Signal Tracking & Detection☆16Updated last week