DominicBreuker / cryptanalysisLinks
Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers
☆28Updated 8 years ago
Alternatives and similar repositories for cryptanalysis
Users that are interested in cryptanalysis are comparing it to the libraries listed below
Sorting:
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆100Updated last year
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 5 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Updated 2 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Updated 11 years ago
- Framework for exploiting local vulnerabilities☆84Updated 2 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 5 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- SubZone - Subdomains, Dns records, & more! || Python tutorial || Certificate authority abuse || Adavnced || Hacking/Info-Sec ||☆42Updated 8 months ago
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 6 years ago
- A Simple C&C Server Written In Python☆34Updated 7 years ago
- A tool to harvest credentials from leaked data dump☆79Updated 4 years ago
- pen testing scripts☆12Updated 4 years ago
- Command line interface to interact with hashes.com escrow service.☆41Updated 5 months ago
- A collection of fraud related tools for research.☆151Updated 6 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected