raoul361 / AWS-hash-crackingLinks
Cracking hashes using AWS GPU instances
☆10Updated 8 years ago
Alternatives and similar repositories for AWS-hash-cracking
Users that are interested in AWS-hash-cracking are comparing it to the libraries listed below
Sorting:
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 5 years ago
- Simplified NAT Slipstream server and client☆22Updated 5 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Updated 7 years ago
- talking LED mask for BSides 2020 presenters☆22Updated 5 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Updated 4 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- Antiscan.me automatization script☆29Updated last year
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- Modern problems require modern solutions☆32Updated 3 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Updated 3 years ago
- python hash cracker☆52Updated last year
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆26Updated 7 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Updated 4 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Network Shredder IDS☆11Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 7 years ago
- Windows Process Injection Toolkit - plain and simple :)☆28Updated 7 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37Updated 10 years ago
- a collection of elf file infectors☆27Updated 4 years ago
- Malicious traffic detection system☆11Updated 3 years ago
- Short little AV Test to check Detection Rates☆20Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated 2 years ago