Viper is a brute-force password cracker.
☆24Feb 10, 2016Updated 10 years ago
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below
Sorting:
- A simple C# md5 hash password cracker using wordlists , A Console application.☆13Feb 24, 2018Updated 8 years ago
- ☆16May 9, 2016Updated 9 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- ZIP cracker, CCRYPT cracker, and others to come.☆92Dec 9, 2025Updated 2 months ago
- ☆16Mar 31, 2017Updated 8 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆16Jul 15, 2020Updated 5 years ago
- C++ Firefox & Google Chrome Cracker Source Code☆37Aug 6, 2017Updated 8 years ago
- App for controlling the DNSCrypt Proxy on Android☆13Dec 28, 2017Updated 8 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Repository for Tor's DNS-related issues.☆17Dec 19, 2016Updated 9 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Jul 13, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Sep 11, 2018Updated 7 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Nov 8, 2012Updated 13 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Rainbow tables utilities☆36Aug 21, 2014Updated 11 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago