defuse / passgenLinks
A password generator.
☆84Updated 4 years ago
Alternatives and similar repositories for passgen
Users that are interested in passgen are comparing it to the libraries listed below
Sorting:
- A Windows Password Generator.☆26Updated 12 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- A Camouflage Proxy for the Tor Anonymity System☆88Updated 10 years ago
- Evil Genius plays the role of the Descartes demon, creating a distorted view of the internet with censorship (it's a censorship simulator…☆38Updated 11 years ago
- chntpw for crack windows password using Linux☆57Updated 13 years ago
- Official implementation of the VirusTotal API in C programming language☆113Updated 2 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- Encrypted Text Messaging☆148Updated 10 years ago
- Script to add iptables rules (on a linux system) that force all traffic through tor☆38Updated 10 years ago
- Shodan Firefox Add-on☆151Updated 4 years ago
- Decrypt WhatsApp msgstore Crypt5☆74Updated 11 years ago
- Security scanner to find temporary config files that contain passwords on public websites☆75Updated 13 years ago
- Collating patches for gpart from all distributions☆31Updated 2 years ago
- An encryption tool for creating file archives☆26Updated 5 months ago
- EFF's Tracker Blocking Laboratory is an experimental project to test heuristic blocking of non-consensual online tracking. It's based on …☆11Updated 12 years ago
- Parallel password cracker. Supports NTLM, LM, MD5, MD4, SHA1, SHA224, SHA256, SHA384, and SHA512.☆41Updated 5 years ago
- NetcatGUI is a simple GUI program that is set to emulate the popular network "swiss army knife" tool netcat (nc) using an easy to use gra…☆44Updated 4 years ago
- Detect snooper on your system!☆85Updated 9 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Updated 7 years ago
- Config generator for chaos vpn☆122Updated 3 years ago
- Hashing tool supporting md5,sha1,sha256,sha512,whirlpool,jh and hmac versions of these. Includes recursive file hashing and other feature…☆68Updated 4 months ago
- Hourglass cryptographically locks your files so they can only be read after a certain amount of time.☆25Updated 9 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 8 years ago
- WiFi Jamming tool☆104Updated 12 years ago
- https://ghostbin.com☆190Updated 6 years ago
- The Java program that generates the Thomson dictionary☆30Updated 11 years ago
- HTTPS Everywhere rulesets for hidden services and eepsites.☆173Updated 8 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- Code to disrupt the Tox network for hardening/testing purposes.☆37Updated 11 years ago
- An advanced memory forensics framework☆25Updated 11 years ago