The User Interface for GoCrack
☆89Apr 10, 2026Updated this week
Alternatives and similar repositories for gocrack-ui
Users that are interested in gocrack-ui are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GoCrack is a management frontend for password cracking tools written in Go☆1,277Nov 19, 2025Updated 4 months ago
- Provides access to libhashcat☆31Apr 6, 2024Updated 2 years ago
- ☆50Aug 11, 2023Updated 2 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 5 years ago
- ☆398Mar 25, 2026Updated 3 weeks ago
- ☆44Feb 27, 2017Updated 9 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- general purpose and malware specific analysis tools☆101Oct 22, 2015Updated 10 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- This loads DWARF info from an open binary and propagates function names, arguments, and type info☆26Jul 11, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Aug 12, 2024Updated last year
- A command line tool for creating malicious outlook rules☆165Dec 11, 2018Updated 7 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- ☆526Aug 11, 2023Updated 2 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- ☆110May 14, 2018Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆87Jun 27, 2024Updated last year
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Multithreaded interactive Mandelbrot and Julia viewer built via a library on OpenGL☆11Apr 30, 2019Updated 6 years ago
- FLARE Kernel Shellcode Loader☆177May 3, 2019Updated 6 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆19May 31, 2017Updated 8 years ago
- appland client☆19Jul 30, 2015Updated 10 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,112Apr 2, 2026Updated 2 weeks ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Oct 3, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago