randorisec / PasswordCrackingSheets
How long will it take to crack a hash ?
☆29Updated 4 years ago
Alternatives and similar repositories for PasswordCrackingSheets:
Users that are interested in PasswordCrackingSheets are comparing it to the libraries listed below
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆20Updated last year
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆48Updated 2 years ago
- A swiss army knife for pentesting networks☆19Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆9Updated 3 months ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆24Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆15Updated 7 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆46Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated 3 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆37Updated 3 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated last year
- Pentesting Mobile apps and resources www.sniferl4bs.com☆37Updated 3 years ago
- Tactics, Techniques, and Procedures☆23Updated 10 months ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆48Updated 8 months ago
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆12Updated 3 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Updated last year
- Repository of tools used in my blog☆50Updated 9 months ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Source of swisskyrepo.github.io - Public☆14Updated 2 months ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆16Updated 2 years ago