praetorian-inc / hashcatJS
An implementation of the hashcat rules engine in javascript
☆47Updated 6 years ago
Alternatives and similar repositories for hashcatJS:
Users that are interested in hashcatJS are comparing it to the libraries listed below
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 7 years ago
- ☆74Updated 11 years ago
- ☆24Updated 10 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28Updated 8 years ago
- ☆27Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Proof-of-Concept scripts for various issues.☆14Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- ☆45Updated 7 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago