🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.
☆234Jan 5, 2023Updated 3 years ago
Alternatives and similar repositories for dcipher-cli
Users that are interested in dcipher-cli are comparing it to the libraries listed below
Sorting:
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Break rotational letter substitution (ROT) encoded text, right from your terminal.☆14Jan 5, 2023Updated 3 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Jan 6, 2023Updated 3 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Jan 5, 2023Updated 3 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆26Jan 6, 2023Updated 3 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- CMS Detection and Exploit Kit based on Whatcms.org API☆259Nov 21, 2024Updated last year
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆272Apr 16, 2021Updated 4 years ago
- ☆12May 9, 2017Updated 8 years ago
- 🌰 An onion url inspector for inspecting deep web links.☆701Aug 4, 2022Updated 3 years ago
- Connect to 2-factor WatchGuard VPNs on Linux with OpenVPN☆16Feb 13, 2017Updated 9 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,810Mar 14, 2026Updated last week
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 6 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Aug 6, 2017Updated 8 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆364Aug 24, 2025Updated 6 months ago
- Command line tool to validate JSON syntax of input file.☆15Feb 25, 2023Updated 3 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆18Jan 5, 2023Updated 3 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 4 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- Detect whether a site is running behind Cloudflare.☆24Jun 16, 2024Updated last year
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆228Sep 18, 2021Updated 4 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆22Feb 6, 2026Updated last month
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- 💤 Kick devices off your network by performing an ARP Spoof attack.☆2,661Feb 27, 2023Updated 3 years ago
- Crack hashes in seconds.☆1,868Dec 10, 2024Updated last year