Utility for binary searching a sorted file for lines that start with the search key
☆18Jun 9, 2018Updated 7 years ago
Alternatives and similar repositories for bsearch
Users that are interested in bsearch are comparing it to the libraries listed below
Sorting:
- ☆31Nov 22, 2021Updated 4 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Jun 21, 2018Updated 7 years ago
- Prototype private key hashing agent☆16Jan 8, 2018Updated 8 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- A diagram with the adoption status of FIDO2 and WebAuthn☆25Mar 22, 2019Updated 6 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- An Inofficial Sysmon Version History (Change Log)☆33Oct 25, 2020Updated 5 years ago
- Script for tracking file system changes☆19Jan 23, 2018Updated 8 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- webshare is a CLI tool that provides web-interface for your local files☆13Dec 2, 2018Updated 7 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆94Aug 19, 2024Updated last year
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- openwrt smart builder with docker☆20Updated this week
- ☆11Sep 3, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- A small tool to export your "attachments" (screenshots/images) from your discord backups☆10Aug 10, 2022Updated 3 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- ASN Lookup Generator for Splunk☆10Jan 24, 2024Updated 2 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- Random one-offs that need a temporary home☆12Jan 28, 2026Updated last month
- ☆12Sep 8, 2017Updated 8 years ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Oct 8, 2021Updated 4 years ago
- Another Instagram Bot☆12Jan 21, 2018Updated 8 years ago