⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
☆21,078Mar 5, 2025Updated last year
Alternatives and similar repositories for Ciphey
Users that are interested in Ciphey are comparing it to the libraries listed below
Sorting:
- 🤖 The Modern Port Scanner 🤖☆19,306Feb 20, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,300Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,190Updated this week
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,153Oct 31, 2023Updated 2 years ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆52,764Updated this week
- Web path scanner☆14,042Feb 20, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,212Updated this week
- Hunt down social media accounts by username across social networks☆73,309Updated this week
- Fast web fuzzer written in Go☆15,679Apr 24, 2025Updated 10 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,883Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,497Nov 16, 2025Updated 3 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,384Updated this week
- CTF framework and exploit development library☆13,293Updated this week
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆13,552Feb 13, 2026Updated 2 weeks ago
- Ghidra is a software reverse engineering (SRE) framework☆65,303Updated this week
- Fast passive subdomain enumeration tool.☆13,159Feb 25, 2026Updated last week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,111Mar 12, 2024Updated last year
- 🕵️♂️ Offensive Google framework.☆18,465Feb 5, 2026Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,415Dec 20, 2025Updated 2 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,923Feb 25, 2026Updated last week
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆3,979Apr 16, 2025Updated 10 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,974Aug 20, 2025Updated 6 months ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,800Feb 23, 2026Updated last week
- A Modern Orchestration Engine for Security☆6,116Updated this week
- In-depth attack surface mapping and asset discovery☆14,193Updated this week
- Impacket is a collection of Python classes for working with network protocols.