brannondorsey / distributed-password-cracking
Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes π²
β183Updated 4 years ago
Alternatives and similar repositories for distributed-password-cracking:
Users that are interested in distributed-password-cracking are comparing it to the libraries listed below
- Hacking systems with the automation of PasteJacking attacks.β392Updated 3 months ago
- Cloak can backdoor any python script with some tricks.β487Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.β180Updated 5 years ago
- Arduino Rubber Ducky Frameworkβ106Updated 5 years ago
- Multiplatform payload dropperβ260Updated 3 years ago
- Advanced Hash Manipulationβ174Updated 5 years ago
- An attack tool designed to remotely disable CCTV camera streams (like in spy movies)β359Updated 3 years ago
- Inject malicious code into *.debsβ268Updated 2 years ago
- Your Social Engineering Sidekickβ179Updated 2 years ago
- Bluetooth Honeypotβ246Updated 4 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β228Updated 4 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.β79Updated 2 years ago
- Fake access point using dns spoof and ssl strippingβ22Updated 6 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scripβ¦β159Updated 8 months ago
- A script written lazily for generating cross-platform backdoors on the go :)β184Updated 6 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)β83Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ370Updated last year
- π Modular web based pentesting interface. Designed to run on Pi devices!β67Updated 6 years ago
- Easy way to brute-force web directory.β147Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β435Updated 7 years ago
- WiFi- and Bluetooth devices overlayed on Google Maps. Sourced from WiGLE Android app / Aircrack-ng.β84Updated 2 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/β120Updated 7 years ago
- Templates for the King Phisher open source phishing campaign toolkit.β166Updated 5 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.β333Updated 2 months ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxiesβ132Updated last year
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service websiteβ¦β92Updated 8 years ago
- information gathering via dorksβ379Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β326Updated 6 months ago
- bettercap's web UIβ326Updated 2 months ago
- A simple, fully python ransomware PoCβ370Updated 4 years ago