Rainbow tables utilities
☆36Aug 21, 2014Updated 11 years ago
Alternatives and similar repositories for rainbow
Users that are interested in rainbow are comparing it to the libraries listed below
Sorting:
- A simple rainbow table generator supporting MD5, SHA224, SHA256, SHA384, and SHA512, written in Python 2.7.☆12Jun 19, 2017Updated 8 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆16Jul 15, 2020Updated 5 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- Base58 to Ripemd160 converter☆12Mar 20, 2021Updated 4 years ago
- A simple C# md5 hash password cracker using wordlists , A Console application.☆13Feb 24, 2018Updated 8 years ago
- Rainbow table attack☆17Jul 18, 2015Updated 10 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Apr 23, 2022Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 10 months ago
- ☆10Sep 11, 2021Updated 4 years ago
- ☆10Feb 23, 2026Updated last week
- C++ Firefox & Google Chrome Cracker Source Code☆37Aug 6, 2017Updated 8 years ago
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- Parallel password cracker. Supports NTLM, LM, MD5, MD4, SHA1, SHA224, SHA256, SHA384, and SHA512.☆41Jan 10, 2021Updated 5 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- DEScrypt CPU Collision Cracker☆51Apr 14, 2019Updated 6 years ago
- Unfinished Whatsapp clone☆20Oct 3, 2013Updated 12 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- Leverage youtube-dl (or dlp) to download youtube content, with flexible formatting.☆11Jan 3, 2024Updated 2 years ago
- Code for the USB write blocker built on the FTDI VNC2 development board☆10Aug 17, 2021Updated 4 years ago
- Tools for attacking Computer Use Agents☆21Jan 16, 2026Updated last month
- Convergent Curve Market Makers for Aggregating Flash Loans and Delegated Credit☆10Feb 6, 2021Updated 5 years ago
- Automatically generate Websites with Omni-GPT.☆10Sep 4, 2023Updated 2 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago
- ☆13Sep 15, 2024Updated last year
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Bunch of Scripts that I write and sometimes maintain☆12Jun 25, 2021Updated 4 years ago
- Archive for data from mcbroken.com.☆13Updated this week
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆11May 10, 2024Updated last year
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago