mspicer / hate_crackLinks
A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
☆10Updated 6 years ago
Alternatives and similar repositories for hate_crack
Users that are interested in hate_crack are comparing it to the libraries listed below
Sorting:
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 8 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- Maltego with a twist of wireless☆26Updated 10 years ago
- Host files with DNS☆33Updated 9 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- A simple powershell script that removes a lot of Windows 10's more unnecessary, annoying, or invasive components.☆23Updated 9 years ago
- VirusTotal tools☆92Updated 5 years ago
- Pineapple Surprise! is a PHP implementation for the Wi-Fi Pineapple or "Jasager". Used in conjunction with dnsspoof it will serve a "surp…☆64Updated 9 years ago
- WaitList.dat Parser☆26Updated 7 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Maltego integration of https://haveibeenpwned.com☆62Updated 9 months ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 6 years ago
- ☆16Updated 9 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 3 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Updated 11 years ago
- Easily setup a hidden service inside the Tor network☆174Updated 2 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- Just a collection of scripts☆40Updated 5 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago