Word split utility
☆13Jun 21, 2018Updated 7 years ago
Alternatives and similar repositories for CorrectStaple
Users that are interested in CorrectStaple are comparing it to the libraries listed below
Sorting:
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 10 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 4 years ago
- Prototype private key hashing agent☆16Jan 8, 2018Updated 8 years ago
- PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer☆22Dec 27, 2024Updated last year
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- A collection of tools used for researching passwords☆19Dec 17, 2024Updated last year
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- ☆25May 18, 2021Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆33Oct 15, 2019Updated 6 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Spark—Python学习笔记☆11Sep 25, 2018Updated 7 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆68May 1, 2019Updated 6 years ago
- ☆31Nov 22, 2021Updated 4 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- A local scanner for vulnerable web applications☆41Feb 10, 2026Updated 3 weeks ago
- Python bindings for hashcat☆33Jun 11, 2021Updated 4 years ago
- DEScrypt CPU Collision Cracker☆51Apr 14, 2019Updated 6 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆10Apr 30, 2024Updated last year
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago