NorthernSec / VeraCracker
Veracrypt Password Cracker
☆79Updated 2 years ago
Alternatives and similar repositories for VeraCracker:
Users that are interested in VeraCracker are comparing it to the libraries listed below
- Shodan Firefox Add-on☆152Updated 3 years ago
- TXT and PDF documents from the NSA☆178Updated 9 years ago
- ☆91Updated 12 years ago
- Remove exif data from all digital pictures in current directory by typing exif☆57Updated 4 years ago
- KeePass 2 database master-password cracker☆131Updated 6 years ago
- TorChat implementation for Android☆41Updated 12 years ago
- Simple detector of ARP poisoning attack☆28Updated 9 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- Qubes component: app-linux-pdf-converter☆55Updated 3 weeks ago
- documentation, scripts, tools related to Zena Forensics (http://blog.digital-forensics.it)☆98Updated 7 years ago
- KeePass Salsa20 Cipher Plugin☆25Updated 8 years ago
- KeySniffer device discovery tools and public advisories☆117Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Truehunter☆31Updated 3 years ago
- VeraCrypt container cracker using hashcat and wordlist/dictionary☆22Updated 4 years ago
- 密码生成 flexible and scriptable password dictionary generator which can support brute-force、combination、complex rule mode etc...☆153Updated last year
- Config generator for chaos vpn☆122Updated 2 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆135Updated 8 years ago
- Truecrypt volume parsing library☆33Updated 4 years ago
- High-Performance word generator with a per-position configureable charset☆448Updated 2 years ago
- Panic button for protection against cold boot attacks☆140Updated 3 years ago
- Scan for subdomains using bruteforcing techniques☆41Updated 8 months ago
- Hide any file in a PNG Image☆20Updated 8 years ago
- This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.…☆48Updated 6 years ago
- Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat☆107Updated 8 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆17Updated 8 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 4 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆66Updated 7 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆305Updated 11 years ago
- The world's first Linux white-box ransomware☆62Updated 6 years ago