bee-san / CipheyLinks
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
☆19,932Updated 6 months ago
Alternatives and similar repositories for Ciphey
Users that are interested in Ciphey are comparing it to the libraries listed below
Sorting:
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,049Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,314Updated last week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆32,525Updated last month
- 🤖 The Modern Port Scanner 🤖☆18,056Updated this week
- Open-Source Phishing Toolkit☆13,115Updated 11 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,261Updated 8 months ago
- Hunt down social media accounts by username across social networks☆68,740Updated this week
- Free and Open Source Reverse Engineering Platform powered by rizin☆17,108Updated last week
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆12,917Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,216Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆70,075Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,812Updated 8 months ago
- An HTTP toolkit for security research.☆8,246Updated 7 months ago
- 🕵️♂️ Offensive Google framework.☆17,866Updated 2 weeks ago
- Fast passive subdomain enumeration tool.☆12,295Updated this week
- Modlishka. Reverse Proxy.☆5,102Updated 3 months ago
- Adversary Emulation Framework☆10,009Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,359Updated this week
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,186Updated 5 years ago
- In-depth attack surface mapping and asset discovery☆13,565Updated 2 weeks ago
- A fast, simple, recursive content discovery tool written in Rust.☆6,968Updated 2 weeks ago
- Directory/File, DNS and VHost busting tool written in Go☆12,543Updated last week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,998Updated last year
- Monitor linux processes without root permissions☆5,657Updated 2 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,358Updated 11 months ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,417Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,804Updated last month
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,379Updated 5 months ago
- httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.☆9,013Updated this week
- The Havoc Framework☆7,836Updated 2 months ago