Encrypt your password or decrypt your hash. Multiple algorithms supported.
☆19Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for CryptDecrypt
Users that are interested in CryptDecrypt are comparing it to the libraries listed below
Sorting:
- Example script that recovers metadata from PDF and DOCX files☆14Aug 26, 2020Updated 5 years ago
- Metasploit Framework☆20May 8, 2017Updated 8 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Sep 21, 2020Updated 5 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- It will automatically send messages to levelup in mee6 or whatever bot☆11Aug 31, 2020Updated 5 years ago
- black Ip lists, dorks-collection☆16Updated this week
- ☆12Nov 15, 2021Updated 4 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 4 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Binary and Static Releases☆16Feb 20, 2026Updated last week
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Shamir Secret Sharing for Nim☆10May 28, 2021Updated 4 years ago
- WASI libc implementation for WebAssembly☆15Jan 28, 2025Updated last year
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- API Server for Sugarchain☆13Mar 12, 2024Updated last year
- ☆12Jan 12, 2023Updated 3 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated last month
- This Python code will quickly find duplicates or similarities in sets of data.☆10Feb 6, 2018Updated 8 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- Steals chrome and firefox cookies and upload to the server using POST api.☆10May 3, 2016Updated 9 years ago
- A curated collection of scripts for kernel-related devops☆13Nov 23, 2023Updated 2 years ago
- Dive into world of ascii art☆10Apr 1, 2021Updated 4 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago