visually see issues with supported cipher suites
☆18Jun 18, 2024Updated last year
Alternatives and similar repositories for cipherchecks
Users that are interested in cipherchecks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 5 months ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 13, 2026Updated last month
- Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in…☆29Sep 4, 2025Updated 8 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆17Aug 10, 2022Updated 3 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 10 months ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- Sample Obsidian's vault for web pentesting☆112Aug 8, 2024Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 9 years ago
- OWASP based Web Application Security Testing Checklist☆86Jul 19, 2024Updated last year
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 8 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆59Mar 2, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Secure Rust Code☆16Dec 10, 2024Updated last year
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- A Vagrantfile and Ansible playbook that can be used to setup test environment with an Exchange server host☆25Jun 14, 2023Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆24Jun 12, 2023Updated 2 years ago