carlospolop / easy_cryptoCTFLinks
Try to bruteforce several cypher algorithms that can be used in CTFs
☆13Updated 3 years ago
Alternatives and similar repositories for easy_cryptoCTF
Users that are interested in easy_cryptoCTF are comparing it to the libraries listed below
Sorting:
- Brutteforce for stego CTFs☆16Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆40Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 3 years ago
- Public exploits☆15Updated 7 years ago
- Repository of tools used in my blog☆52Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- ☆27Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆39Updated 7 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆33Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 6 years ago
- Advanced web server fingerprinting☆22Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- Custom pentesting tools☆25Updated 4 years ago
- ☆33Updated 7 months ago
- SMB password sprayer☆20Updated 6 years ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago