Hatch is a brute force tool that is used to brute force most websites
☆26Oct 26, 2023Updated 2 years ago
Alternatives and similar repositories for Hatch-python3-optimised
Users that are interested in Hatch-python3-optimised are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆158May 19, 2022Updated 3 years ago
- 🔐 Google Chrome password recovery tool written using Powershell and a tiny bit of Batch!☆16Jul 15, 2019Updated 6 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- masscan result parsing, web server fingerprinting☆17Jul 24, 2022Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)☆13Jun 10, 2021Updated 4 years ago
- Anonfiles files leaker via keyword.☆16Dec 20, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆15Aug 29, 2023Updated 2 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- ☆12Dec 2, 2019Updated 6 years ago
- Simple app to generate read-to-print Open Collective gift cards☆11Apr 29, 2020Updated 6 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- Network and IP Tools For Attack and Hacking Burtforce☆13Aug 19, 2022Updated 3 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- testing123☆14Nov 23, 2024Updated last year
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 9 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆25May 1, 2022Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 5 years ago
- Hack for start other istance of wpa_supplicant daemon☆13Nov 16, 2017Updated 8 years ago
- Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords☆13Jul 17, 2016Updated 9 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- Ladon for Linux (Kali), Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password☆53Dec 10, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- a simple web interface to check whether your OpenAI API key supports GPT-4☆25Dec 27, 2023Updated 2 years ago
- A Scampage-Builder tool is a malicious software or program designed to create scam web pages, often used in phishing attacks.☆26Sep 13, 2023Updated 2 years ago
- ☆23Feb 18, 2018Updated 8 years ago
- BruteForce Image Patchmatch☆11Jan 14, 2023Updated 3 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago