brannondorsey / distributed-password-cracking
Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes π²
β186Updated 4 years ago
Alternatives and similar repositories for distributed-password-cracking:
Users that are interested in distributed-password-cracking are comparing it to the libraries listed below
- Advanced Hash Manipulationβ178Updated 5 years ago
- Cloak can backdoor any python script with some tricks.β493Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.β185Updated 5 years ago
- Arduino Rubber Ducky Frameworkβ107Updated 5 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/β121Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploitβ152Updated 7 years ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β233Updated 2 years ago
- Mirror Pastebin.com to a local SQLiteβ52Updated 6 years ago
- Multiplatform payload dropperβ273Updated 3 years ago
- A simple and easy to use JS Botnetβ99Updated 3 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.β79Updated 2 years ago
- Use Invoke-PSImage to deliver a payload in an Imageβ52Updated 7 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxiesβ139Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ357Updated 6 months ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β231Updated 4 years ago
- [unofficial fork] RAR bruteforce crackerβ41Updated 7 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.β14Updated 3 years ago
- Parser for data dumps Collection #1 / Collection #2-5β146Updated 6 years ago
- Fake access point using dns spoof and ssl strippingβ22Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β439Updated 7 years ago
- USB keystroke injector controlled by smartphone.β228Updated 2 months ago
- transform your payload.exe into one fake word doc (.ppt)β465Updated 5 years ago
- Chat with hacker assistantβ191Updated 7 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β280Updated last year
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ162Updated 2 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remβ¦β74Updated 2 years ago
- Templates for the King Phisher open source phishing campaign toolkit.β174Updated 5 years ago
- A malicious captive wifi portalβ143Updated 4 years ago
- π Modular web based pentesting interface. Designed to run on Pi devices!β68Updated 6 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.β77Updated 6 years ago