Python Hash Cracker.
☆45Oct 17, 2021Updated 4 years ago
Alternatives and similar repositories for Python-Hash-Cracker
Users that are interested in Python-Hash-Cracker are comparing it to the libraries listed below
Sorting:
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Python based 32-bit Windows debugger built for learning purposes. Currently includes breakpoint setting, register modification, process m…☆13Jun 24, 2020Updated 5 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- ☆11May 19, 2017Updated 8 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- Summit Route End Point Protection - Client code☆16Apr 10, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- SQLi Injection Hack Tool☆20May 18, 2016Updated 9 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- ☆47Sep 3, 2025Updated 5 months ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- A python script designed to grab the original url from an adfly url without opening it :D☆57Mar 3, 2017Updated 8 years ago
- Python version of OWASP's DirBuster Application.☆29Dec 18, 2014Updated 11 years ago
- recover deleted information from sqlite files.☆65Jun 17, 2016Updated 9 years ago
- Sirve para ver las peticiones entre el navegador y el servidor pero en el caso del internet gratis a través de vpn también los puede ayud…☆11Oct 1, 2021Updated 4 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆70Nov 6, 2016Updated 9 years ago
- ## Now you can download the most powerful tools using this simple script ### Screenshot ☆30Feb 22, 2018Updated 8 years ago
- Dockercon 2016 Security Workshop☆35Aug 30, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Repository for Endpoint Security Testing☆35Jul 26, 2018Updated 7 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago