carlospolop / easy_cryptoCTFLinks
Try to bruteforce several cypher algorithms that can be used in CTFs
☆13Updated 3 years ago
Alternatives and similar repositories for easy_cryptoCTF
Users that are interested in easy_cryptoCTF are comparing it to the libraries listed below
Sorting:
- Brutteforce for stego CTFs☆16Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆40Updated 6 years ago
- SMB password sprayer☆20Updated 6 years ago
- Collection of various wordlists☆33Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 3 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆19Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- ☆33Updated 6 months ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- Public exploits☆15Updated 7 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆35Updated 5 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 5 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆30Updated 2 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆15Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 5 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- The Advanced Automated Pentesting And Forensics Tool☆26Updated last year