AstroCrypt is a powerful and versatile tool designed to assist you in both cracking hashed passwords and identifying the hash type used to secure them. This tool provides an all-in-one solution for security professionals and system administrators to manage password-related challenges effectively.
☆17Oct 26, 2023Updated 2 years ago
Alternatives and similar repositories for AstroCrypto
Users that are interested in AstroCrypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of my GitHub stars!☆18Sep 29, 2017Updated 8 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- Archive for acez.re blog.☆21Apr 17, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆40Mar 13, 2026Updated last week
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- The media player for language learning, with dual subtitles, AI-generated subtitles, realtime-OCR, translation, word lookup, and more!☆14Apr 27, 2025Updated 10 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A short Java program that, on startup, sets a file to NASA's image of the day. Designed to be used for windows desktops.☆12Sep 11, 2020Updated 5 years ago
- ☆11Feb 14, 2025Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Put that Pop!_OS rocket on your Debian-based distro's boot screen.☆16Mar 7, 2021Updated 5 years ago
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 2 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- ☆38Jan 6, 2025Updated last year
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- A micro LLM multi-agent system for data analysis☆17Apr 27, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Jul 8, 2020Updated 5 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆52Feb 8, 2024Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- A simple, 100% Rust implementation of a vector storage database with on disk persistency.☆32Jul 5, 2024Updated last year
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- ☆50Mar 7, 2026Updated 2 weeks ago