Python Hash Cracker.
☆45Oct 17, 2021Updated 4 years ago
Alternatives and similar repositories for Python-Hash-Cracker
Users that are interested in Python-Hash-Cracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic Windows 32-bit debugger with special functions like directory monitoring and DLL injection☆14Mar 7, 2019Updated 7 years ago
- This Windows and Mac tool cracks the iOS restrictions passcode from an iTunes backup.☆21Jun 11, 2020Updated 5 years ago
- A suite of rules to validate GitHub repositories using PSRule.☆29Updated this week
- ☆40Mar 18, 2018Updated 8 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Set of tools for anti DDOS attacks protection on shared/dedicated hosting☆11Jan 31, 2014Updated 12 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- ☆11May 19, 2017Updated 8 years ago
- Scrape of all MIBs taken from http://mibs.snmplabs.com/asn1☆17Feb 3, 2020Updated 6 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Arch Linux Metasploit Framework Installation Script☆13Nov 28, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Mar 31, 2017Updated 9 years ago
- Easily patch ASR on 64-bit devices.☆11Jul 31, 2022Updated 3 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Small c++ basic packet sniffer for TCP, UDP, IGMP, and Others. Built for learning purposes.☆27Oct 12, 2016Updated 9 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆21Nov 15, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A python script designed to grab the original url from an adfly url without opening it :D☆56Mar 3, 2017Updated 9 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆16Apr 13, 2015Updated 11 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- SpringBoard Headers for iOS 9.3☆12Jul 26, 2016Updated 9 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- iOS Userland Forensic Dumping Framework for iOS 7/8☆20Apr 4, 2026Updated 3 weeks ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- ☆47Sep 3, 2025Updated 7 months ago
- Plugin for x64dbg☆13Apr 29, 2017Updated 9 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 9 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- A simple sql parser with context-free grammer, predictive parser and lexer with DFA☆12Oct 29, 2015Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Nov 14, 2016Updated 9 years ago