randorisec / PasswordCrackingSheets
How long will it take to crack a hash ?
☆27Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for PasswordCrackingSheets
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆32Updated 3 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆18Updated last year
- Nexus of Android banking Trojans☆15Updated last year
- Miscellaneous tools for BloodHound☆18Updated 2 years ago
- Maltego transform with Keskivonfer☆14Updated 4 years ago
- Android Mobile☆18Updated this week
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.☆16Updated 2 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆12Updated 4 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆16Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆29Updated 2 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆14Updated 7 years ago
- The Network Execution Tool☆13Updated 7 months ago
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 3 years ago
- ☆11Updated 4 years ago
- Collection of F-Droid repositories☆15Updated 11 months ago
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆26Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated last year
- Open Penetration Testing Bookmarks Collection☆19Updated 9 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆19Updated 2 years ago