FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.
☆36Mar 25, 2021Updated 5 years ago
Alternatives and similar repositories for FCracker
Users that are interested in FCracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Sep 22, 2022Updated 3 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Sep 19, 2019Updated 6 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Brute Force attack with Python in Kali Linux☆14Mar 6, 2022Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Information Gathering & WebSite ReConnaissance.☆24Feb 8, 2018Updated 8 years ago
- It has been developed in order to facilitate the use of ready-made Brute Force tools in Kali-Linux operating systems and is written in Py…☆16Nov 16, 2020Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 5 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆67Nov 22, 2020Updated 5 years ago
- mac changer and tor re-starter this script restart tor service every 17 sec!☆17Apr 24, 2022Updated 3 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- ☆13Feb 2, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- Scriptable VSCode extension to generate or manipulate data. Stop pasting sensitive data in webpages.☆53Dec 16, 2025Updated 3 months ago
- ☆18Aug 30, 2015Updated 10 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- A versatile hacking framework that consolidates tools for OSINT, penetration testing, networking, auditing, and more, providing a compre…☆62May 31, 2023Updated 2 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A tool that can be used in Kali linux or Parrot Os to generate fake facebook profiles☆22Mar 7, 2022Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Mar 18, 2026Updated last week
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆15Jul 25, 2021Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago