Encrypt your password or decrypt your hash. Multiple algorithms supported.
☆19Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for CryptDecrypt
Users that are interested in CryptDecrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example script that recovers metadata from PDF and DOCX files☆14Aug 26, 2020Updated 5 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 4 years ago
- Build better technical newsletters and emails☆16May 27, 2024Updated last year
- Generador de los sitios estáticos para mostrar las estadísticas del fútbol de la comunidad desde una Google Spreadsheet.☆10Apr 16, 2021Updated 4 years ago
- Use asynchronous, Promise-based functions in middleware clean up router blocks☆10Nov 12, 2017Updated 8 years ago
- Bot-Telegram-Shodan☆11May 7, 2022Updated 3 years ago
- ☆12Jan 3, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Decrypt encrypted passwords in EmailProvider.db on samsung phones.☆13Aug 14, 2017Updated 8 years ago
- In this project we will build a web portal for our GoT data analysis and visualization system. The website will integrate all the apps cr…☆10Apr 3, 2019Updated 6 years ago
- ☆11May 5, 2015Updated 10 years ago
- ☆24Jul 14, 2021Updated 4 years ago
- Netcat binaries compiled for ARM that work on Android devices☆12Jun 12, 2015Updated 10 years ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- WASI libc implementation for WebAssembly☆15Jan 28, 2025Updated last year
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- Search library for yandex.ru search engine.☆16Jun 13, 2017Updated 8 years ago
- Some of my day-to-day use scripts☆16Nov 10, 2020Updated 5 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Moki Distribution - ICS/SCADA Tools☆113Jul 18, 2017Updated 8 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- Distrubición Linux para Osint☆58Sep 9, 2018Updated 7 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 10 months ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- ☆12Nov 15, 2021Updated 4 years ago
- piBrick Pocket-CM5 is a smartphone-sized handheld PC powered by the Raspberry Pi CM5, featuring a 3.91" AMOLED touch display and a QWERTY…☆45Updated this week
- Script to extract a signature of the first blocks of the disk, to be able to dectect boot tampering attemps.☆10Jul 8, 2016Updated 9 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Shamir Secret Sharing for Nim☆10May 28, 2021Updated 4 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- the code that powers Wikicoding, the wikipedia of code.☆11Apr 5, 2017Updated 8 years ago