Password list character frequency analyzer that can output hashcat masks
☆16May 22, 2019Updated 6 years ago
Alternatives and similar repositories for panalyzer
Users that are interested in panalyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- ☆12May 2, 2017Updated 8 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- USB 10 digit seven segment display unit☆15Jul 8, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Extracts information from APK files.☆14May 6, 2024Updated last year
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Collection of my nmap scripts (most are in official nmap release by now)☆35Oct 23, 2013Updated 12 years ago
- Encode and decode pairs of surrogate characters in Python 3☆10Mar 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 剑指Offer所有面试题C++11解法☆12May 29, 2018Updated 7 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Windows application for remapping keyboards with user-customized layouts.☆18Aug 4, 2021Updated 4 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆16Dec 22, 2020Updated 5 years ago
- Converts a JavaScript key event object into a humanly readable format☆27Oct 1, 2021Updated 4 years ago
- A streaming implementation of SipHash in C as well as an optimized one-pass implementation.☆27Nov 5, 2012Updated 13 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- ☆20Oct 7, 2013Updated 12 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Holepunch API☆61Nov 2, 2019Updated 6 years ago
- USB threat evaluation framework for Linux☆11Nov 2, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- Bluetooth software keyboard and mouse switch for Raspberry Pi☆23Jun 7, 2020Updated 5 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- iOS Minicap provides a socket interface for streaming realtime screen capture data out of iOS devices.☆27Sep 27, 2017Updated 8 years ago