🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.
☆234Jan 5, 2023Updated 3 years ago
Alternatives and similar repositories for dcipher-cli
Users that are interested in dcipher-cli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decipher hashes using online rainbow & lookup table attack services.☆155Jan 5, 2023Updated 3 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Break rotational letter substitution (ROT) encoded text, right from your terminal.☆14Jan 5, 2023Updated 3 years ago
- Detect whether an IP address belongs to a Tor exit node.☆22Jan 6, 2023Updated 3 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Jan 5, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆26Jan 6, 2023Updated 3 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 3 months ago
- CMS Detection and Exploit Kit based on Whatcms.org API☆260Nov 21, 2024Updated last year
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 8 years ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆272Apr 16, 2021Updated 4 years ago
- ☆12May 9, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Connect to 2-factor WatchGuard VPNs on Linux with OpenVPN☆16Feb 13, 2017Updated 9 years ago
- 🌰 An onion url inspector for inspecting deep web links.☆701Aug 4, 2022Updated 3 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,815Mar 20, 2026Updated 2 weeks ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 7 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,384May 22, 2020Updated 5 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 11 months ago
- Know the dangers of credential reuse attacks.☆2,104Dec 9, 2025Updated 4 months ago
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Aug 6, 2017Updated 8 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆365Aug 24, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Command line tool to validate JSON syntax of input file.☆15Feb 25, 2023Updated 3 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆19Jan 5, 2023Updated 3 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 4 years ago
- scrapin' proxies with ocr☆19Jun 19, 2018Updated 7 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Detect whether a site is running behind Cloudflare.☆24Jun 16, 2024Updated last year
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆25Mar 20, 2026Updated 2 weeks ago
- XOR cat - a command line tool to XOR a data stream with a given key☆33Apr 7, 2013Updated 13 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆229Sep 18, 2021Updated 4 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago