A silly & effective MD5 cracker in Python
☆257Jan 22, 2026Updated 2 months ago
Alternatives and similar repositories for PyBozoCrack
Users that are interested in PyBozoCrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- SHELL SCANNER☆21Apr 11, 2019Updated 6 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- Trying to be the best tool to search for exploits in the terminal.☆21Oct 23, 2022Updated 3 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Github information gathering☆25Jul 19, 2021Updated 4 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Python implementation of the SlowLoris DoS attack.☆23Mar 19, 2017Updated 9 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- This is a personal script used to link Kali Nethunter Chroot/Termux to the Proxmark3 and small patch for DriveDroid on Android 12.☆11Jan 24, 2022Updated 4 years ago
- Passive Vulnerability Auditor☆136Jul 26, 2016Updated 9 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- C++ library for detecting Visual C++ runtimes on Windows XP and later.☆18Jul 7, 2014Updated 11 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- giskismet – Wireless recon visualization tool☆55Aug 26, 2016Updated 9 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- A bookmarklet that shows the ordering on the directed edges of your facebook friends☆30Mar 28, 2013Updated 12 years ago
- A simple web based tool for working with assembly / disassembly☆90Feb 20, 2026Updated last month
- beautiful hash generator☆46Apr 22, 2018Updated 7 years ago
- Autocomplete functionallity for PHPUnit assertions.☆18Aug 9, 2023Updated 2 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da …☆61Apr 20, 2020Updated 5 years ago
- Rewrite of the Angular tutorial in React☆16May 7, 2014Updated 11 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- ☆15Aug 11, 2014Updated 11 years ago
- ☆13Apr 23, 2018Updated 7 years ago