bee-san / AresLinks
Automated decoding of encrypted text without knowing the key or ciphers used
β792Updated this week
Alternatives and similar repositories for Ares
Users that are interested in Ares are comparing it to the libraries listed below
Sorting:
- Steganalysis web platformβ717Updated 3 months ago
 - The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·β1,757Updated last month
 - Crack legacy zip encryption with Biham and Kocher's known plaintext attack.β1,991Updated last week
 - Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH, PKCS#12, PKCS#7, and CSR in PEM and DER formats.β129Updated last week
 - poc for CVE-2024-38063 (RCE in tcpip.sys)β680Updated last year
 - Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.β147Updated last year
 - Worlds fastest steghide cracker, chewing through millions of passwords per secondβ1,205Updated 2 years ago
 - π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,602Updated 8 months ago
 - A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks.β1,263Updated last year
 - π Caido releases, wiki and roadmapβ1,892Updated 3 weeks ago
 - Chepy is a python lib/cli equivalent of the awesome CyberChef tool.β1,016Updated last week
 - Python decompiler for modern Python versions.β807Updated last month
 - Hash type identifier (CLI & lib)β913Updated 2 months ago
 - a signal handler race condition in OpenSSH's server (sshd)β486Updated last year
 - Network analysis tool for Attack Defence CTFβ386Updated 3 weeks ago
 - Weakpass collection of tools for bruteforce and hashcrackingβ634Updated last month
 - QR Code Analysis and Recovery Toolkitβ483Updated 2 months ago
 - toolkit for python reverse engineeringβ925Updated last month
 - PyInstaller Extractor Next Generationβ537Updated 9 months ago
 - Dump cookies and credentials directly from Chrome/Edge process memoryβ1,359Updated last month
 - Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,399Updated last year
 - Recovers pixelized text from imagesβ218Updated 3 years ago
 - A web-based, accessible and open-source port of StegSolve.β362Updated last year
 - Decode All Bases - Base Scheme Decoderβ573Updated 2 years ago
 - Exploit PoC for CVE-2024-32002β528Updated last year
 - CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicatβ¦β1,738Updated 4 months ago
 - Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463β477Updated 3 months ago
 - Sticky notes for pentesting, bug bounty, CTF.β745Updated 3 months ago
 - Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!β2,462Updated this week
 - Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,466Updated 3 years ago