bee-san / Ciphey
β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘
β18,870Updated 3 weeks ago
Alternatives and similar repositories for Ciphey:
Users that are interested in Ciphey are comparing it to the libraries listed below
- The all-in-one browser extension for offensive security professionals πβ6,021Updated 2 months ago
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,832Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β9,676Updated last week
- π€ The Modern Port Scanner π€β16,019Updated this week
- Reverse Engineer's Toolkitβ4,906Updated 11 months ago
- A Workflow Engine for Offensive Securityβ5,533Updated last month
- Gather and update all available and newest CVEs with their PoC.β6,839Updated this week
- A curated list of CTF frameworks, libraries, resources and softwaresβ10,190Updated 8 months ago
- π΅οΈββοΈ Offensive Google framework.β16,315Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β9,398Updated 7 months ago
- An HTTP toolkit for security research.β6,691Updated last month
- Some setup scripts for security research tools.β8,803Updated 2 weeks ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).β12,077Updated last week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,422Updated 5 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.β9,893Updated this week
- A collection of custom security tools for quick needs.β3,183Updated last year
- Scanning APK file for URIs, endpoints & secrets.β5,202Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,644Updated 8 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β17,421Updated this week
- Web path scannerβ12,702Updated last month
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,535Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,002Updated last week
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β8,452Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ64,192Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β17,193Updated this week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,269Updated 5 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ12,242Updated 2 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β22,693Updated this week
- Automated decoding of encrypted text without knowing the key or ciphers usedβ632Updated this week
- In-depth attack surface mapping and asset discoveryβ12,694Updated this week