DEScrypt CPU Collision Cracker
☆51Apr 14, 2019Updated 7 years ago
Alternatives and similar repositories for DEScrypt-CPU-Collision-Cracker
Users that are interested in DEScrypt-CPU-Collision-Cracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Milk Sad vulnerability☆17Mar 26, 2024Updated 2 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- VanBitCracken Random☆16Aug 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆26Aug 16, 2019Updated 6 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 4 years ago
- A c# cracker tool for bitcoin brainwallets and other low entropy key algorithms.☆20Sep 15, 2025Updated 7 months ago
- Hash Generator & Cracker☆39Mar 24, 2020Updated 6 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- A collection of hashcat-hcstat files☆34Feb 13, 2018Updated 8 years ago
- bip38-cracker, for this contest by casascius: https://bitcointalk.org/index.php?topic=128699.0☆21Dec 5, 2012Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- An Advanced Web Crawler and DirBuster☆113Mar 9, 2022Updated 4 years ago
- Check if a IP is from tor or is a malicious proxy☆58Feb 9, 2021Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 7 years ago
- In this repository I'm going to train an RL agent using metatrader in python!☆11Mar 20, 2024Updated 2 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Lightweight utility to fool port scanners☆32Feb 28, 2020Updated 6 years ago
- The repo for the ViruSafe Backend project.☆11Jan 21, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 2 months ago
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- ZigZagOnParabolic is a classic zigzag indicator changed to use Parabolic SAR as the basis for its peaks and troughs.☆14Aug 8, 2025Updated 8 months ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- This 🐍Python🐍 project uses `PyQt6` to create a GUI that reads and analyzes Bitcoin wallet files, providing insights into encrypted keys…☆11Jun 2, 2025Updated 11 months ago
- Brute force Bitcoin private keys.☆42Apr 5, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Dec 8, 2021Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated 3 months ago
- ☆14Aug 27, 2025Updated 8 months ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- The Nmap Scanner for Telco☆170Sep 26, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago