MD5, SHA1 and WordPress Decryptor
☆26Jan 16, 2018Updated 8 years ago
Alternatives and similar repositories for HatDecrypter
Users that are interested in HatDecrypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Scripts desenvolvidos por mim em Python para pesquisas de segurança e levantamentos de vulnerabilidades.☆15Nov 29, 2017Updated 8 years ago
- discontinued☆527Aug 17, 2023Updated 2 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- PS Vita ELF/PRX2 (symbol) loader plugin for Binary Ninja☆19Oct 23, 2024Updated last year
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Spartacus is a multi-purpose library written in C#.☆24Jun 23, 2017Updated 8 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- ☆63Jan 15, 2016Updated 10 years ago
- Firmware validation of Apple T1 and prior Macs☆26Feb 18, 2022Updated 4 years ago
- suckless ramdisk tool for iOS8+☆14Sep 23, 2022Updated 3 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 5 months ago
- Detecting malicious WiFi with mining cryptocurrency.☆50Mar 16, 2018Updated 8 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Eagle is a Web Application Attack and Audit Framework. Eagle has moved to Bitbucket.☆11Nov 21, 2016Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Cyber security bot for Discord Hack Week 2019☆13Mar 26, 2021Updated 4 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Brute force para senhas linux☆46Jan 11, 2023Updated 3 years ago
- Vulnerabilities discovered in npm packages [Berkeley PL & Security Research]☆42Jun 22, 2024Updated last year
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆40Oct 28, 2021Updated 4 years ago
- Connect to 2-factor WatchGuard VPNs on Linux with OpenVPN☆16Feb 13, 2017Updated 9 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Black Hat 2017 Talk☆12Jul 31, 2017Updated 8 years ago
- Ferramenta de Reconhecimento para Pentest☆48Jul 24, 2021Updated 4 years ago
- weak password generation☆13Oct 16, 2015Updated 10 years ago
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only s…☆12Aug 2, 2013Updated 12 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago