Decipher hashes using online rainbow & lookup table attack services.
β155Jan 5, 2023Updated 3 years ago
Alternatives and similar repositories for dcipher
Users that are interested in dcipher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β234Jan 5, 2023Updated 3 years ago
- Hex encode & decode a string, right from your terminal.β10Jan 5, 2023Updated 3 years ago
- In this project, I build a model and also implement that for classifying the message into spam or ham through the text of the message usiβ¦β12Nov 26, 2022Updated 3 years ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)β13Sep 2, 2022Updated 3 years ago
- A better dns bruteforcer written in golangβ13Nov 4, 2018Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.β72Jan 21, 2019Updated 7 years ago
- The Hunt for Malicious Stringsβ13Oct 8, 2020Updated 5 years ago
- This tool is great for information gathering and post- exploitationβ16Jul 20, 2021Updated 4 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.β58Aug 22, 2019Updated 6 years ago
- Standardizing Security Titlesβ13Dec 31, 2025Updated 2 months ago
- Automatically exported from code.google.com/p/hookmeβ13Oct 8, 2015Updated 10 years ago
- A collection of curated Java Deserialization Exploitsβ11May 22, 2018Updated 7 years ago
- OSINT license plate data by scraping lookup site(s)β13Apr 2, 2023Updated 2 years ago
- An Intro to Penetration Testing Workshopβ15May 31, 2018Updated 7 years ago
- A program to find the real string for your hash. MD5, SHA256, any really. Works really fast, gets to the "aaaa" combo in about 1 second eβ¦β18Jun 5, 2021Updated 4 years ago
- Word counting made easy. Retrieve the number of words in a string or stdin.β10Jan 5, 2023Updated 3 years ago
- Retrieve an array of possible hash types corresponding to a given string.β17Jan 5, 2023Updated 3 years ago
- Demo of various ways to exploit post based reflected XSSβ18Jul 6, 2023Updated 2 years ago
- Fake SMB and SAMR dataβ11Oct 27, 2019Updated 6 years ago
- Windows Network File System Remote exploit for CVE-2022-30136β14Jul 11, 2023Updated 2 years ago
- Information I give to people who are moving from Twitter to Mastodonβ16Dec 5, 2022Updated 3 years ago
- Security Related Tools and Resourcesβ16Aug 10, 2017Updated 8 years ago
- AWS Security Toolβ29Jan 1, 2024Updated 2 years ago
- Password Attack Toolkitβ16Nov 1, 2018Updated 7 years ago
- Accompanying material needed for the workshopβ11Jun 14, 2023Updated 2 years ago
- Scanner for public s3 bucketsβ12Oct 23, 2017Updated 8 years ago
- Exploits for some of the vulnerabilities I have discoveredβ19Aug 3, 2020Updated 5 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.β20Jun 26, 2014Updated 11 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficientβ1,557Oct 17, 2022Updated 3 years ago
- CMS Detection and Exploit Kit based on Whatcms.org APIβ259Nov 21, 2024Updated last year
- Magisk module to remove bootloader unlock warning on Samsung Galaxy A12β18Mar 15, 2024Updated 2 years ago
- Web Recon & Exploitation Tool.β55Mar 8, 2020Updated 6 years ago
- Perl script to bruteforce SSH known_hosts files.β25Jun 9, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/sqlifuzzerβ12May 22, 2015Updated 10 years ago
- The Wasmer.io websiteβ21May 31, 2023Updated 2 years ago
- Amazon S3 bucket spelunking!β87Aug 23, 2017Updated 8 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)β44Jun 6, 2022Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ17Mar 5, 2020Updated 6 years ago
- A simple code for detects Host header vulnerabilityβ12Feb 18, 2020Updated 6 years ago