janstarke / rexgen
API Documentation
☆52Updated last year
Alternatives and similar repositories for rexgen:
Users that are interested in rexgen are comparing it to the libraries listed below
- Python bindings for hashcat☆58Updated 5 years ago
- Password analysis software☆37Updated 9 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 5 years ago
- Truehunter☆31Updated 3 years ago
- Packet-o-matic NG !☆65Updated 6 months ago
- ZIP encryption info☆30Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Liberté Linux, a live distribution serving as a communication aid in hostile environments.☆83Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆51Updated 9 years ago
- [deprecated] see README☆42Updated 4 years ago
- ☆12Updated 8 years ago
- PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP …☆27Updated 11 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- ☆69Updated 6 years ago
- Command-line utility to control Tor.☆89Updated last year
- apbleed☆24Updated 10 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆97Updated 3 years ago
- Database of private SSL/SSH keys for embedded devices☆256Updated last year
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- python tor client☆26Updated 9 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 9 years ago
- Script to add iptables rules (on a linux system) that force all traffic through tor☆40Updated 9 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- DNS tunnel☆60Updated 11 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago