k4m4 / dcipher-cli
πCrack hashes using online rainbow & lookup table attack services, right from your terminal.
β234Updated 2 years ago
Alternatives and similar repositories for dcipher-cli:
Users that are interested in dcipher-cli are comparing it to the libraries listed below
- Decipher hashes using online rainbow & lookup table attack services.β155Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ356Updated 4 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ371Updated last year
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β228Updated 4 years ago
- search for hosts info with shodanβ230Updated 3 years ago
- Collection of social engineering payloadsβ295Updated 7 years ago
- β150Updated last year
- The Hacker's ToolBoxβ184Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS andβ¦β115Updated 4 years ago
- Advanced Hash Manipulationβ175Updated 5 years ago
- β οΈWARNING: This project now become part of https://github.com/j3ssie/Metabigor projectβ177Updated 5 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.β268Updated 3 years ago
- Cloak can backdoor any python script with some tricks.β488Updated 5 years ago
- The Credential Mapperβ440Updated 7 years ago
- Hamburglar -- collect useful information from urls, directories, and filesβ317Updated 2 years ago
- Automates some pentest jobs via nmap xml fileβ324Updated 6 years ago
- β193Updated 6 years ago
- A web front-end for password cracking and analyticsβ623Updated 3 years ago
- Passive Vulnerability Auditorβ130Updated 8 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbotβ145Updated 7 years ago
- Perform advanced MiTM attacks on websites with ease πβ667Updated 10 months ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β437Updated 7 years ago
- Pastebin OSINT Harvesterβ321Updated 5 years ago
- Tool made to automate tasks of pentesting.β166Updated 5 years ago
- Collect information about email addresses from Pastebinβ35Updated 3 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywordsβ430Updated 3 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)β319Updated 7 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxiesβ135Updated last year
- network reconnaissance toolkitβ421Updated 6 years ago
- information gathering via dorksβ382Updated 2 years ago