☆19Feb 21, 2015Updated 11 years ago
Alternatives and similar repositories for Password-Cracking-Suite
Users that are interested in Password-Cracking-Suite are comparing it to the libraries listed below
Sorting:
- Metasploit Framework☆20May 8, 2017Updated 8 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malware☆19Jun 8, 2015Updated 10 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- ☆30Nov 14, 2019Updated 6 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- Pure python, SSL/TLS protocol and cipher scanner/enumerator.☆27Jun 16, 2025Updated 8 months ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆38Aug 22, 2016Updated 9 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Nov 11, 2019Updated 6 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- ☆13Jan 17, 2025Updated last year
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Go-To Example for Unreal Engine 4 Modding Support☆11Feb 26, 2018Updated 8 years ago
- Function used for requesting and getting a PlayFab multiplayer server through an Azure Cloud Function☆12Jan 12, 2022Updated 4 years ago
- CryHTML5 without CryEngine. CEF as a DirectX gaming overlay.☆10Jul 11, 2018Updated 7 years ago
- A Layer-7 HTTP DOS tool☆10Jul 12, 2018Updated 7 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Testing new resource style☆10Nov 20, 2024Updated last year
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- ☆11Dec 17, 2018Updated 7 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- RethinkDB TokenStore for Passwordless☆12Apr 12, 2019Updated 6 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- ☆11Apr 19, 2025Updated 10 months ago
- Fully automated SSL Secure Site activation☆20Jan 4, 2019Updated 7 years ago
- Automated Evil Twin attack. In progress☆10Aug 17, 2020Updated 5 years ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago