brannondorsey / distributed-password-cracking
Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes π²
β184Updated 4 years ago
Alternatives and similar repositories for distributed-password-cracking:
Users that are interested in distributed-password-cracking are comparing it to the libraries listed below
- Chat with hacker assistantβ192Updated 7 years ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β233Updated 2 years ago
- An automated Wireless RogueAP MITM attack framework.β183Updated 5 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β228Updated 4 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/β122Updated 7 years ago
- Universal MITM web serverβ107Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ371Updated last year
- Scan the entire internet for SSH and Telnet services. Then hack them.β79Updated 2 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]β223Updated 3 years ago
- Multiplatform payload dropperβ267Updated 3 years ago
- bettercap's web UIβ329Updated 3 months ago
- Fake access point using dns spoof and ssl strippingβ22Updated 7 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)β83Updated 3 years ago
- π Modular web based pentesting interface. Designed to run on Pi devices!β68Updated 6 years ago
- An all-in-one WPA/WPS toolkitβ408Updated last year
- CryptoTrojan in Python (For educational purpose ONLY)β47Updated 6 years ago
- Social engineering tool for human hackingβ120Updated 8 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.β252Updated 4 years ago
- Pythonic ransomware proof of concept.β216Updated 4 years ago
- Inject malicious code into *.debsβ272Updated 2 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?β406Updated 3 years ago
- Plug-and-play bash script for sniffing 802.11 probes requestsβ249Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)β464Updated 5 years ago
- A simple bash based metasploit automation tool!β121Updated 2 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remβ¦β73Updated 2 years ago
- Perform advanced MiTM attacks on websites with ease πβ669Updated 11 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ356Updated 4 months ago
- network reconnaissance toolkitβ422Updated 6 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploitβ152Updated 7 years ago
- A malicious captive wifi portalβ142Updated 4 years ago