ghost-pep / aes-burstLinks
A dictionary-based AES brute forcer that targets weak key generation.
☆7Updated 5 years ago
Alternatives and similar repositories for aes-burst
Users that are interested in aes-burst are comparing it to the libraries listed below
Sorting:
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 10 months ago
- Collection of rules and debug data for hashcat☆19Updated 8 years ago
- A stand-alone implementation of Hashcat's rule engine☆34Updated 8 years ago
- Detect & filter duplicate hashcat rules☆45Updated 6 months ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- ☆27Updated 4 years ago
- Distillations and expansions on Rocktastic12a☆14Updated 3 years ago
- Simple parser framework.☆26Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 6 years ago
- ☆38Updated 6 months ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 8 months ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- Random Hashcat Scrips☆29Updated 9 months ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆62Updated 12 years ago
- ☄️ go-out - A Golang egress buster.☆129Updated last year
- A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.☆59Updated last week
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- ☆116Updated 3 months ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 8 months ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- Run commands on linux through those pesky firewalls☆26Updated 10 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 3 months ago
- gpocheck☆30Updated 11 months ago
- ☆76Updated 7 years ago