bee-san / CipheyLinks
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
☆20,240Updated 9 months ago
Alternatives and similar repositories for Ciphey
Users that are interested in Ciphey are comparing it to the libraries listed below
Sorting:
- 🤖 The Modern Port Scanner 🤖☆18,641Updated last week
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,102Updated 2 years ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,280Updated last week
- Scanning APK file for URIs, endpoints & secrets.☆5,736Updated 3 months ago
- Free and Open Source Reverse Engineering Platform powered by rizin☆18,086Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,319Updated last month
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆12,352Updated this week
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,200Updated 5 years ago
- CTF framework and exploit development library☆13,078Updated 2 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,617Updated last week
- Clone this repo to build Frida☆19,181Updated last month
- Directory/File, DNS and VHost busting tool written in Go☆13,096Updated this week
- Fast web fuzzer written in Go☆15,210Updated 7 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,438Updated 11 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,982Updated this week
- World's fastest and most advanced password recovery utility☆24,907Updated 3 weeks ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,963Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆72,110Updated 3 weeks ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,075Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,586Updated 3 weeks ago
- The recursive internet scanner for hackers. 🧡☆9,192Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,905Updated this week
- Automated decoding of encrypted text without knowing the key or ciphers used☆814Updated this week
- An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.☆47,310Updated last week
- Fast passive subdomain enumeration tool.☆12,634Updated last week
- UNIX-like reverse engineering framework and command-line toolset☆22,737Updated this week
- Firmware Analysis Tool☆13,340Updated 3 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,601Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆33,414Updated 4 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,368Updated 2 months ago