HatBashBR / HatDecrypter
MD5, SHA1 and WordPress Decryptor
☆27Updated 7 years ago
Alternatives and similar repositories for HatDecrypter:
Users that are interested in HatDecrypter are comparing it to the libraries listed below
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 6 years ago
- Força bruta em formulários web.☆19Updated 10 years ago
- Amarula Python Botnet☆9Updated 6 years ago
- Send Attack Web Forms☆36Updated 3 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆19Updated 6 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 8 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- Pentest tool for OSINT in social networks☆36Updated 9 years ago
- Lock user screen every time the flash drive is unplugged. Creating a two-step authentication on the machine☆16Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆20Updated 8 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Telegram BotNet☆36Updated last year
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 8 years ago
- ☆9Updated 8 years ago
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆30Updated last week
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- php-cli vulnerability scanner☆80Updated 9 years ago
- ☆19Updated 10 years ago
- ☆28Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Updated 6 years ago
- F.Security Framwork☆19Updated 8 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 10 years ago
- This software was coded for people to study keyloggers and other virus for windows operating system.☆10Updated 9 years ago
- Collection My Wordlist☆122Updated 8 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆48Updated 7 years ago
- Hardening Tool for *nixes☆50Updated 7 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 10 years ago
- This is just a repository of a developer noob.☆17Updated 7 years ago