DominicBreuker / cryptanalysisLinks
Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers
☆29Updated 8 years ago
Alternatives and similar repositories for cryptanalysis
Users that are interested in cryptanalysis are comparing it to the libraries listed below
Sorting:
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 6 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆99Updated last year
- Red Team Tool Kit☆16Updated 6 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Updated 10 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated last year
- Command line interface to interact with hashes.com escrow service.☆44Updated last month
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Updated 4 years ago
- ☆22Updated 9 years ago
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 7 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- ☆29Updated 5 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Updated 2 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Updated 6 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆90Updated 10 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15Updated 5 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Get clients and access points.☆48Updated 6 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆27Updated 8 years ago