Demeuk is a simple tool to clean up corpora (like dictionaries) or any dataset containing plain text strings.
☆21Aug 6, 2025Updated 7 months ago
Alternatives and similar repositories for demeuk
Users that are interested in demeuk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Official OSSEC docker container☆14Jun 11, 2021Updated 4 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Updated this week
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- A lightweight C++/C AFF4 reader library☆14Feb 5, 2026Updated last month
- Protect domains from malicious browser extensions☆17Apr 16, 2025Updated 11 months ago
- An updated, and more attractive, polyamory pride flag☆15Aug 15, 2020Updated 5 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- A package for Unicode-friendly string compression using Unishox2☆24Nov 5, 2022Updated 3 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Packing detection tool for PE files☆27Dec 1, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Checking the status of Russian internet properties (via RIPE Atlas) being targeted by Ukraine's hacktivist "IT ARMY" Telegram group (and …☆18May 31, 2022Updated 3 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆28Dec 19, 2025Updated 3 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆16Nov 29, 2025Updated 3 months ago
- Make Windows VMs Faster☆32Jun 30, 2013Updated 12 years ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- UpCy automatically finds compatible updates for Maven dependencies.☆12Feb 8, 2026Updated last month
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- 从0开始逐步在 PyTorch 中实现类似 ChatGPT 的大语言模型☆11Dec 10, 2024Updated last year
- Nginx base distroless☆27Oct 7, 2020Updated 5 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Removes Windows 10 bloatware☆24Dec 27, 2021Updated 4 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Jul 11, 2023Updated 2 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated last month
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- ☆83Apr 22, 2022Updated 3 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago