Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and reverse shell payload generation to demonstrate system vulnerabilities. It also offers a fun and neon-styled UI
☆50Jan 9, 2026Updated 2 months ago
Alternatives and similar repositories for Touti-Cracker
Users that are interested in Touti-Cracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last week
- ☆12Nov 13, 2024Updated last year
- ☆20Nov 28, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated last month
- ☆163Mar 20, 2026Updated last week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆19May 17, 2025Updated 10 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆124Jul 19, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- PromptMe is an educational project that showcases security vulnerabilities in large language models (LLMs) and their web integrations. It…☆96Jun 29, 2025Updated 9 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆70Updated this week
- IDA helper plugin to reverse engineer Objective-C code☆44Jun 12, 2025Updated 9 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆127Mar 15, 2026Updated 2 weeks ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆44Sep 16, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆23Mar 4, 2025Updated last year
- Secure Code Review AI Agent (SeCoRA) - AI SAST☆55Jan 29, 2025Updated last year
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 9 months ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 2 months ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 10 months ago
- The "Out Of Box Experience" (otherwise known as OOBE) for Reunion7.☆24Feb 11, 2025Updated last year
- ☆384Sep 20, 2025Updated 6 months ago
- Ensure your password safety by scanning in data breaches.☆116Dec 9, 2025Updated 3 months ago
- Security tool against dependency typosquatting attacks☆55Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆134Feb 12, 2026Updated last month
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 27, 2026Updated last month
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆122Jan 30, 2026Updated last month
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 22, 2026Updated last week
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated 3 months ago