How long will it take to crack a hash ?
☆31Mar 25, 2020Updated 5 years ago
Alternatives and similar repositories for PasswordCrackingSheets
Users that are interested in PasswordCrackingSheets are comparing it to the libraries listed below
Sorting:
- Security conferences talks☆25Jul 10, 2020Updated 5 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- ☆14Jan 7, 2023Updated 3 years ago
- ☆17Mar 22, 2019Updated 6 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- ☆17Jun 7, 2022Updated 3 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- A brand new OS that runs in various kinds of TEEs and supports Linux ABI☆16Aug 21, 2021Updated 4 years ago
- Synchronize data between spotify-accounts. Supports synchronized playlists, favorite songs, followed singers, etc.☆14Jun 16, 2021Updated 4 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- ☆13Apr 8, 2021Updated 4 years ago
- ☆16May 20, 2019Updated 6 years ago
- ICSE 2021 Artifact for: Shipwright: A Human-in-the-Loop System for Dockerfile Repair.☆23May 11, 2021Updated 4 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- ☆19Apr 14, 2024Updated last year
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- Solar Tracker projects☆12May 20, 2024Updated last year
- E-Commerce Online Shop Design made in HTML5 & SCSS with JS☆13Oct 5, 2023Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Safari tabs for iPhone on iOS 14.x☆12May 7, 2021Updated 4 years ago
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- A library for gathering history entries of major browsers☆13Feb 26, 2018Updated 8 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Mozilla Firefox Tweaks. Use at your own risk and fun.☆16Nov 27, 2023Updated 2 years ago
- crypttab keyscript for supplying a passphrase over the network☆15Apr 23, 2015Updated 10 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- AECS(Attestation based Enclave Configuration Service)☆14Jan 10, 2024Updated 2 years ago