Hatch is a brute force tool that is used to brute force most websites
☆26Oct 26, 2023Updated 2 years ago
Alternatives and similar repositories for Hatch-python3-optimised
Users that are interested in Hatch-python3-optimised are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆158May 19, 2022Updated 3 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- ☆14Jan 31, 2026Updated last month
- masscan result parsing, web server fingerprinting☆17Jul 24, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Adds an IP Address feed (CIDR) into Check Point Objects via a URL☆11May 22, 2020Updated 5 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- Bash script to crack rdp with THC-Hydra☆19Oct 22, 2021Updated 4 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- ☆11Dec 26, 2022Updated 3 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- FNB 48 Firmware, Manual and Bluetooth App repo. The official link for the app is dead, so never know when the other will be dead. Mirror …☆15Mar 5, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆14Aug 29, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 4 years ago
- Simple app to generate read-to-print Open Collective gift cards☆11Apr 29, 2020Updated 5 years ago
- My new Dotfiles with the Catppuccin theme☆11Sep 27, 2023Updated 2 years ago
- Network and IP Tools For Attack and Hacking Burtforce☆13Aug 19, 2022Updated 3 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- View card balances using ARKit 2 and image tracking.☆18Jun 29, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆22Apr 6, 2018Updated 7 years ago
- Brute force script with python for ftp servers.☆11Sep 14, 2023Updated 2 years ago
- Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords☆13Jul 17, 2016Updated 9 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- Attack ms sql servers base on shodan python library and pymssql library☆22Jul 8, 2020Updated 5 years ago
- Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11☆19Aug 20, 2020Updated 5 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- A Simple Passcode Bypass for iDevice lock☆24Apr 15, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Wifi Password Stealer (USB rubber ducky to steal wifi password)☆16Apr 24, 2023Updated 2 years ago
- Wine with Microsoft dotnet☆23Nov 25, 2025Updated 4 months ago
- A simple graphical utility to activate and deactivate iDevices in GNU/Linux☆23Aug 12, 2010Updated 15 years ago
- Ladon for Linux (Kali), Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password☆53Dec 10, 2019Updated 6 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago