janstarke / rexgenLinks
API Documentation
☆55Updated 2 years ago
Alternatives and similar repositories for rexgen
Users that are interested in rexgen are comparing it to the libraries listed below
Sorting:
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆124Updated 12 years ago
- hashkill password recovery tool☆197Updated 11 years ago
- Python bindings for hashcat☆63Updated 6 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 10 years ago
- ZIP encryption info☆30Updated 5 months ago
- Password analysis software☆37Updated 10 years ago
- unhash is a set of tools designed to enable better password auditing☆120Updated 3 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- Mirror of http://silicone.homelinux.org/git/netsed.git/☆63Updated 8 years ago
- hid emulation tools for the usbarmory☆68Updated 9 years ago
- Word-generator based on per-position markov-chains☆185Updated 2 years ago
- Public release of the RetroScope Android memory forensics framework☆119Updated 5 years ago
- WPS related utilities☆166Updated 10 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- WPA2 passphrase recovery tool for UPC%07d devices☆59Updated 10 years ago
- [deprecated] see README☆42Updated 5 years ago
- ☆147Updated 9 years ago
- Panic button for protection against cold boot attacks☆146Updated 3 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- Password Hash Identification☆222Updated last week
- Packet-o-matic NG !☆64Updated last week
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Guaranteed cracking of M$ Office files using RC4 40-bit encryption☆82Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Try to find the password of a LUKS encrypted volume.☆274Updated last year
- Private keys that have become public ...☆184Updated 3 weeks ago
- ☆384Updated 13 years ago