WithSecureLabs / captcha22
CAPTCHA22 is a toolset for building, and training, CAPTCHA cracking models using neural networks.
☆331Updated 3 years ago
Alternatives and similar repositories for captcha22:
Users that are interested in captcha22 are comparing it to the libraries listed below
- Software to identify the different types of hashes used to encrypt data and especially passwords☆584Updated 10 months ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,512Updated 4 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆619Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆508Updated 10 months ago
- search Google and extract results directly. skip all the click-through links and other sketchiness☆498Updated 2 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆745Updated 5 months ago
- 🐧 Abuse of Google Colab for cracking hashes.☆937Updated last year
- A list of shodan filters☆556Updated 6 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆912Updated 2 years ago
- Some of the best web shells that you might need!☆332Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆626Updated 3 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆369Updated 3 months ago
- Convolutional neural network for analyzing pentest screenshots☆1,083Updated last year
- Running Hashcat on Google Colab with session backup and restore.☆729Updated 3 years ago
- A DNS rebinding attack framework.☆1,069Updated last month
- Local file inclusion exploitation tool☆844Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆394Updated 4 years ago
- A passive subdomain finder☆329Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆221Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆704Updated 2 years ago
- Hashcat Cheatsheet for OSCP☆605Updated 4 years ago
- Mass scan IPs for vulnerable services☆1,028Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,533Updated last week
- Hash identification program.☆152Updated 3 years ago
- Search gtfobins and lolbas files from your terminal☆458Updated 2 years ago
- Zero Infrastructure Password Cracking☆401Updated 6 months ago
- Generate Email, Register for anything, Get the OTP/Link☆584Updated last year
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆776Updated last year
- Identify technologies used on websites.☆282Updated last year