carlospolop / easy_cryptoCTF
Try to bruteforce several cypher algorithms that can be used in CTFs
☆13Updated 2 years ago
Alternatives and similar repositories for easy_cryptoCTF:
Users that are interested in easy_cryptoCTF are comparing it to the libraries listed below
- Brutteforce for stego CTFs☆16Updated 2 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆11Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Windows Keylogger in C++☆17Updated 2 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Repository of tools used in my blog☆50Updated 9 months ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- ☆34Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆10Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 4 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆18Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆12Updated 2 years ago
- Wordlists generated over the years of penetration testing☆10Updated 8 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago