brannondorsey / distributed-password-crackingLinks
Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes π²
β188Updated 5 years ago
Alternatives and similar repositories for distributed-password-cracking
Users that are interested in distributed-password-cracking are comparing it to the libraries listed below
Sorting:
- Chat with hacker assistantβ195Updated 8 years ago
- Advanced Hash Manipulationβ175Updated 6 years ago
- Mirror Pastebin.com to a local SQLiteβ51Updated 7 years ago
- A simple bash based metasploit automation tool!β125Updated 2 years ago
- [unofficial fork] RAR bruteforce crackerβ39Updated 7 years ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β234Updated 3 years ago
- A malicious captive wifi portalβ149Updated 5 years ago
- π Modular web based pentesting interface. Designed to run on Pi devices!β70Updated 7 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/β125Updated 8 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β244Updated 5 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ163Updated 3 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)β84Updated 4 years ago
- An automated Wireless RogueAP MITM attack framework.β186Updated 6 years ago
- Cloak can backdoor any python script with some tricks.β499Updated 6 years ago
- CryptoTrojan in Python (For educational purpose ONLY)β50Updated 7 years ago
- Plug-and-play bash script for sniffing 802.11 probes requestsβ252Updated 7 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploitβ159Updated 8 years ago
- Easily setup a hidden service inside the Tor networkβ173Updated 2 years ago
- IoT device indexer and search engine.β60Updated 6 years ago
- Bluetooth Honeypotβ262Updated 5 years ago
- Web-based WiFi monitorβ67Updated 3 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service websiteβ¦β93Updated 9 years ago
- Inject malicious code into *.debsβ280Updated 3 years ago
- Multiplatform payload dropperβ281Updated 4 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.β79Updated 3 years ago
- Custom Fake Portal To Harvest Users Social Media Accountsβ59Updated 3 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS responseβ291Updated 8 years ago
- Locky generates "really" strong yet easy to remember passwords.β70Updated 6 years ago
- Control remote computers using discord bot and python 3.β183Updated 3 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.β125Updated 8 years ago