digininja / deleetView external linksLinks
Take a word list and convert 1337 spellings back to normal
☆12Nov 20, 2017Updated 8 years ago
Alternatives and similar repositories for deleet
Users that are interested in deleet are comparing it to the libraries listed below
Sorting:
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- NSEC3 Zone Walker☆12Nov 27, 2025Updated 2 months ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆29Sep 15, 2025Updated 4 months ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Effective filter to prevent weak passwords. Tests actual attacks used by crackers.☆19Oct 25, 2025Updated 3 months ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated last month
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆26Nov 21, 2018Updated 7 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 10 years ago
- tools for analyzing strings from password lists☆58Aug 15, 2022Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- Defending against XSS in SVG files☆31Dec 29, 2019Updated 6 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆33Aug 1, 2016Updated 9 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- A Lean 4 formalization of partial combinatory algebras.☆14Jan 6, 2025Updated last year
- Wordlists designed for generating passphrases☆41Jan 21, 2026Updated 3 weeks ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- A tool for sorting blocks of lines☆36Oct 4, 2022Updated 3 years ago
- A Ruby DSL for crafting assmebly programs and shellcode.☆50Jan 12, 2026Updated last month
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- ☆53Jul 9, 2013Updated 12 years ago
- 📚 Playground and cheatsheet for learning Python. Collection of Python scripts that are split by topics and contain code examples with ex…☆12Jan 30, 2023Updated 3 years ago