Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.
☆13Feb 29, 2020Updated 6 years ago
Alternatives and similar repositories for hash-cracker-ICA
Users that are interested in hash-cracker-ICA are comparing it to the libraries listed below
Sorting:
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- OWASP Learning Gateway Project☆14Apr 18, 2023Updated 2 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Nov 15, 2019Updated 6 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Phraseanet dependency repository☆29Jun 12, 2017Updated 8 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Web☆13Feb 23, 2026Updated last week
- The frontend app of Mailcow's CowUI web interface☆12Apr 29, 2024Updated last year
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- ☆12Sep 15, 2025Updated 5 months ago
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- ☆11Jul 10, 2024Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Sep 30, 2017Updated 8 years ago
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆12Nov 28, 2016Updated 9 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- A collection of intentionally vulnerable test bench applications for testing the Contrast Security Node Agent.☆10Oct 13, 2025Updated 4 months ago
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- Easiest way to make sure your page or post is ready to go live☆10Jan 19, 2026Updated last month
- Password management and cracking training☆13Jul 15, 2025Updated 7 months ago
- Java API library for BSI TR-03110 cv certificates used for Extended Access Control (EAC)☆12Apr 24, 2025Updated 10 months ago
- ☆11Oct 15, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- PyBitmessage API frontend for Android using QT5 and python 3☆12Oct 3, 2018Updated 7 years ago
- reclaim your stuff from social media silos☆47Jan 13, 2015Updated 11 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago