DominicBreuker / cryptanalysisLinks
Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers
☆30Updated 7 years ago
Alternatives and similar repositories for cryptanalysis
Users that are interested in cryptanalysis are comparing it to the libraries listed below
Sorting:
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- The hacker technical cheat sheet☆40Updated 2 weeks ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆34Updated 7 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 5 years ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- A framework to automate the OSINT process at night☆31Updated 4 years ago
- A tool for enumerating usernames from text, files, or websites☆81Updated 3 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆98Updated last year
- A tool to harvest credentials from leaked data dump☆72Updated 3 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆23Updated 4 years ago
- Small tool to capture packets from Bluetooth devices.☆52Updated last year
- Maltego integration of https://clearbit.com☆39Updated 4 years ago
- It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info.…☆56Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated this week
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- OSINT CTF I created hosted on FBCTF, here you will find the write up done by Antony Mutiga @AntonyMutiga twitter username, and the flags …☆12Updated 6 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆33Updated 3 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Totem maltego transform☆28Updated 4 years ago