Take a word list and convert 1337 spellings back to normal
☆12Nov 20, 2017Updated 8 years ago
Alternatives and similar repositories for deleet
Users that are interested in deleet are comparing it to the libraries listed below
Sorting:
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- NSEC3 Zone Walker☆12Nov 27, 2025Updated 3 months ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 5 months ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Effective filter to prevent weak passwords. Tests actual attacks used by crackers.☆19Oct 25, 2025Updated 4 months ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Defending against XSS in SVG files☆31Dec 29, 2019Updated 6 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Wordlists designed for generating passphrases☆41Jan 21, 2026Updated last month
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ☆53Jul 9, 2013Updated 12 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆13Mar 31, 2022Updated 3 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Matrix digital rain in P5.JS & Canvas☆11Sep 22, 2019Updated 6 years ago
- A repo which contains lots of things which it shouldn't☆43Oct 23, 2019Updated 6 years ago
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 7 years ago
- GitHub Mirror of Hash-Identifier☆32Jan 26, 2012Updated 14 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170May 3, 2018Updated 7 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆100Feb 24, 2024Updated 2 years ago
- expand and report on a given domain's SPF policy☆48Mar 15, 2024Updated last year
- OneRuleToRuleThemAll... hashcat optimised rule☆110Dec 16, 2024Updated last year
- michalspacek.cz + michalspacek.com + subdomains source code because why not☆11Updated this week
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- μBlaze Architecture Plugin for Binary Ninja☆11May 29, 2022Updated 3 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago