⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
☆21,362Apr 29, 2026Updated this week
Alternatives and similar repositories for Ciphey
Users that are interested in Ciphey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🤖 The Modern Port Scanner 🤖☆19,683Apr 21, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,442Apr 22, 2026Updated last week
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,212Oct 31, 2023Updated 2 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,199Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,735Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,409Updated this week
- Web path scanner☆14,238Updated this week
- Automated decoding of encrypted text without knowing the key or ciphers used☆869Updated this week
- CTF framework and exploit development library☆13,412Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,149Apr 18, 2026Updated 2 weeks ago
- Fast web fuzzer written in Go☆15,986Apr 26, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,646Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,768Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,601Mar 21, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hunt down social media accounts by username across social networks☆82,821Updated this week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,647Dec 19, 2025Updated 4 months ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆13,734Apr 27, 2026Updated last week
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,928Apr 22, 2026Updated last week
- Fast passive subdomain enumeration tool.☆13,541Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,133Mar 12, 2024Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,498Apr 12, 2026Updated 3 weeks ago
- Ghidra is a software reverse engineering (SRE) framework☆67,996Updated this week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,234Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Rich is a Python library for rich text and beautiful formatting in the terminal.☆56,233Apr 12, 2026Updated 3 weeks ago
- Scanning APK file for URIs, endpoints & secrets.☆6,048Aug 20, 2025Updated 8 months ago
- A swiss army knife for pentesting networks☆9,129Dec 6, 2023Updated 2 years ago
- In-depth attack surface mapping and asset discovery☆14,484Apr 17, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,671Apr 27, 2026Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,701Apr 15, 2026Updated 2 weeks ago
- 🕵️♂️ Offensive Google framework.☆18,763Apr 10, 2026Updated 3 weeks ago
- A Modern Orchestration Engine for Security☆6,221Updated this week
- Adversary Emulation Framework☆11,110Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,594Apr 13, 2026Updated 3 weeks ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆4,521Apr 14, 2026Updated 2 weeks ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,515May 1, 2025Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,481Apr 23, 2026Updated last week
- articles☆13,795Apr 3, 2023Updated 3 years ago
- Easily and securely send things from one computer to another☆34,779Apr 26, 2026Updated last week
- The all-in-one browser extension for offensive security professionals 🛠☆6,699Jan 5, 2025Updated last year