frohoff / ciphrLinks
CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptographic operations on streams of data from the command line; mostly intended for ad hoc, infosec-related uses.
☆116Updated 6 years ago
Alternatives and similar repositories for ciphr
Users that are interested in ciphr are comparing it to the libraries listed below
Sorting:
- Common Findings Database☆100Updated 5 years ago
- Tool to help identify timing attacks☆70Updated 13 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago
- A JBoss script for obtaining remote shell access☆173Updated 4 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- ☆89Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- ☆151Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- Attack Knowledge Base☆100Updated 8 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- ☆113Updated 8 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 6 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 6 years ago
- ☆54Updated 8 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Fetch, install and search exploit archives from exploit sites.☆115Updated last year
- ☆90Updated 5 months ago