Python Hash Cracker.
☆45Oct 17, 2021Updated 4 years ago
Alternatives and similar repositories for Python-Hash-Cracker
Users that are interested in Python-Hash-Cracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic Windows 32-bit debugger with special functions like directory monitoring and DLL injection☆14Mar 7, 2019Updated 7 years ago
- This Windows and Mac tool cracks the iOS restrictions passcode from an iTunes backup.☆22Jun 11, 2020Updated 5 years ago
- A suite of rules to validate GitHub repositories using PSRule.☆28Updated this week
- ☆40Mar 18, 2018Updated 8 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- DDOS and Bruteforce prevention and notifications☆16Aug 14, 2023Updated 2 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- paperwallet - vertcoin☆11Jun 11, 2015Updated 10 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Summit Route End Point Protection - Client code☆16Apr 10, 2016Updated 9 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- ☆11May 19, 2017Updated 8 years ago
- adapted CPU cgminer for vertcoin based on pooler-cpuminer☆24Feb 7, 2014Updated 12 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- Free Your Self - A simple Jekyll-powered website to receive donations☆15Oct 21, 2011Updated 14 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆70Nov 6, 2016Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A Vertcoin paper wallet generator☆11May 25, 2022Updated 3 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Easily patch ASR on 64-bit devices.☆11Jul 31, 2022Updated 3 years ago
- SQLi Injection Hack Tool☆20May 18, 2016Updated 9 years ago
- Website, Database and Tools☆12Jun 13, 2016Updated 9 years ago
- Small c++ basic packet sniffer for TCP, UDP, IGMP, and Others. Built for learning purposes.☆27Oct 12, 2016Updated 9 years ago
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- An example binary protocol application for learning CANAPE☆23Dec 14, 2014Updated 11 years ago
- Repository for BTC ATM. Goal: Python script that prints out a QR code with bitcoins worth $20☆10Dec 10, 2014Updated 11 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- Tiny Bitcoin Library written in C, with nSPV added☆15Oct 28, 2020Updated 5 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- BUILD YOUR OWN BLOCKCHAIN: A PYTHON TUTORIAL Download the full Jupyter/iPython notebook from Github here Build Your Own Blockchain – The…☆19Jun 15, 2019Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Leetcode and other coding challenges solved in Python, C++ and Go.☆12Sep 15, 2023Updated 2 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago