bee-san / CipheyLinks
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
☆20,003Updated 7 months ago
Alternatives and similar repositories for Ciphey
Users that are interested in Ciphey are comparing it to the libraries listed below
Sorting:
- 🤖 The Modern Port Scanner 🤖☆18,176Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,198Updated last week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,159Updated 7 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,276Updated 9 months ago
- Next generation web scanner☆6,126Updated last week
- Gather and update all available and newest CVEs with their PoC.☆7,264Updated this week
- Open-Source Phishing Toolkit☆13,169Updated last year
- Automated decoding of encrypted text without knowing the key or ciphers used☆778Updated last week
- Web path scanner☆13,516Updated 2 weeks ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆15,463Updated 9 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,908Updated 4 months ago
- Free and Open Source Reverse Engineering Platform powered by rizin☆17,737Updated 2 weeks ago
- A little tool to play with Windows security☆20,851Updated 5 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,880Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆5,644Updated last month
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,055Updated last year
- A fast, simple, recursive content discovery tool written in Rust.☆7,001Updated last week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,153Updated 3 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,469Updated last month
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,192Updated 5 years ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆12,960Updated last week
- The recursive internet scanner for hackers. 🧡☆9,025Updated last week
- In-depth attack surface mapping and asset discovery☆13,625Updated last month
- Fast passive subdomain enumeration tool.☆12,365Updated last week
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆12,928Updated 4 months ago
- Fast web fuzzer written in Go☆14,877Updated 5 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆25,035Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆14,918Updated last week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,306Updated this week
- CTF framework and exploit development library☆12,944Updated 2 weeks ago