carlospolop / easy_cryptoCTF
Try to bruteforce several cypher algorithms that can be used in CTFs
☆13Updated 2 years ago
Alternatives and similar repositories for easy_cryptoCTF:
Users that are interested in easy_cryptoCTF are comparing it to the libraries listed below
- Brutteforce for stego CTFs☆16Updated 2 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 2 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Malicious traffic detection system☆11Updated 2 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆39Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated last year
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- ☆33Updated 3 months ago
- only for 31337☆22Updated 8 years ago