DominicBreuker / cryptanalysis
Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers
☆30Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for cryptanalysis
- flood area with fake essids☆20Updated 7 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Collection of our CTF write-ups☆28Updated 4 years ago
- Determine everything you need to know to about a system☆30Updated 6 years ago
- A Gmail credential harvester☆9Updated 5 months ago
- Password cracking utility☆51Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- Record X11 keypress events to a log file☆24Updated 6 years ago
- personal fork of OSINT tool recon-ng☆16Updated 6 years ago
- Getting Envisioncollision to actually work.☆12Updated 7 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆32Updated 6 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 2 years ago
- CTF designed for Middle School-aged kids☆10Updated 3 weeks ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated last year
- A simple python reverse shell written just for fun.☆65Updated last year
- Red Team Tool Kit☆13Updated 5 years ago
- A default credential scanner.☆9Updated 6 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- A tool to harvest credentials from leaked data dump☆61Updated 2 years ago