hashcat / hashcat-legacy
Advanced CPU-based password recovery utility
☆2,149Updated 2 years ago
Alternatives and similar repositories for hashcat-legacy:
Users that are interested in hashcat-legacy are comparing it to the libraries listed below
- Sniffing browser history using HSTS☆936Updated 7 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,501Updated 7 years ago
- All your IPs are belong to us.☆669Updated 6 years ago
- *This project is no longer actively maintained. If you'd like to become the maintainer, please let us know.* ZeroDB is an end-to-end encr…☆1,557Updated 6 years ago
- an open source ransomware honeypot☆902Updated 9 years ago
- Gryffin is a large scale web security scanning platform.☆2,066Updated 4 years ago
- wireless hacking - This is automated wireless hacking tool☆1,252Updated 2 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆654Updated 4 months ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- Pre-migration repository. New repository ➙☆859Updated 7 years ago
- [not maintained] find out what's hogging your internet connection.☆1,231Updated 6 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,694Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,118Updated 4 years ago
- Foreign LINUX - Run unmodified Linux applications inside Windows.☆3,571Updated 9 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,515Updated last year
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,055Updated 3 years ago
- HTTP/HTTPS MITM proxy and recorder.☆1,615Updated last year
- Private messaging system that hides metadata☆2,480Updated 5 years ago
- A fast and stealthy credential harvester☆623Updated last year
- Dshell is a network forensic analysis framework.☆5,469Updated 11 months ago
- A system automation and configuration management stack targeted toward operational flexibility and policy compliance.☆1,338Updated 5 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆1,966Updated 3 years ago
- OS X Auditor is a free Mac OS X computer forensics tool☆3,126Updated 4 years ago
- Run a script when one or more sensors fail.☆874Updated 8 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆931Updated 2 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,109Updated 8 years ago
- GnuPG symmetric secrets manager☆1,549Updated this week
- Monitor the output of terminals and processes.☆1,014Updated 9 years ago
- 🔑🔥📈 Next Level PGP☆3,476Updated 6 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,586Updated last year