Its purpose is to encode your desired hash text
☆34Jan 22, 2022Updated 4 years ago
Alternatives and similar repositories for HashCode
Users that are interested in HashCode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- The Choice TheChoice is a collection of 14 hacker tools from @thelinuxchoice Installation : $ apt update && apt upgrade $ apt install git…☆17Dec 31, 2020Updated 5 years ago
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- ☆23Jan 29, 2023Updated 3 years ago
- Encrypt your password or decrypt your hash. Multiple algorithms supported.☆19Feb 1, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- A collection of frida scripts to facilitate reverse engineering of android apps.☆12Feb 20, 2024Updated 2 years ago
- ☆59Jan 19, 2022Updated 4 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- A containerized LDAP client web application based on web2ldap☆12Oct 24, 2016Updated 9 years ago
- ☆11Jun 24, 2023Updated 2 years ago
- git clone https://github.com/zanyarjamal/xerxes☆15Aug 13, 2019Updated 6 years ago
- Faitagram (FIXED) Brute Force Application for Facebook, Twitter & Instagram.☆18Nov 30, 2021Updated 4 years ago
- Facebook ID Auto Report $ apt update && apt upgrade $ pkg install python2 $ pkg install git $ pkg install unzip $ pkg install tor $ pkg i…☆12Jan 1, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Jangan di recode bangsat☆12Jan 18, 2023Updated 3 years ago
- Code related with system programming (os, admin, etc.)☆13Jul 11, 2020Updated 5 years ago
- Copy the image to the Clipboard in Base64 format.☆14Apr 10, 2014Updated 12 years ago
- Source and scripts for building the MOFO Linux distribution.☆12Feb 16, 2019Updated 7 years ago
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- A series of examples demonstrated in Python code in the Python dev Society group☆13Nov 2, 2025Updated 5 months ago
- Approve all pending followers☆13May 7, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Jan 2, 2022Updated 4 years ago
- ☆11Feb 27, 2022Updated 4 years ago
- Check CCTV vuln☆19Apr 27, 2019Updated 6 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- Facebook Video Downloader (CLI) For Linux Systems Coded in PHP☆36Oct 3, 2017Updated 8 years ago
- Generate cryptographically secure, memorable passphrases.☆13Jun 4, 2020Updated 5 years ago
- ☆13Jan 2, 2022Updated 4 years ago
- Blackbird OSINT tool FrontEnd React Project☆13Mar 6, 2024Updated 2 years ago
- Microsoft give away books downloader in Linux or Windows☆13Feb 3, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.☆46Apr 14, 2018Updated 8 years ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 9 months ago
- Wifihack - Admite todos los valores (WEP, WPS, WPA, WPA2)☆10Dec 31, 2019Updated 6 years ago
- ☆10Feb 27, 2022Updated 4 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- ☆11Oct 20, 2019Updated 6 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago