visually see issues with supported cipher suites
☆17Jun 18, 2024Updated last year
Alternatives and similar repositories for cipherchecks
Users that are interested in cipherchecks are comparing it to the libraries listed below
Sorting:
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in…☆29Sep 4, 2025Updated 5 months ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Jun 12, 2023Updated 2 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- OWASP based Web Application Security Testing Checklist☆84Jul 19, 2024Updated last year
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 4 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆17Jul 7, 2022Updated 3 years ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Jun 19, 2024Updated last year
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 3 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 4 years ago
- A Vagrantfile and Ansible playbook that can be used to setup test environment with an Exchange server host☆26Jun 14, 2023Updated 2 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆25Sep 7, 2025Updated 5 months ago
- Side Channel script☆25Mar 1, 2023Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Mar 4, 2020Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Sample Obsidian's vault for web pentesting☆104Aug 8, 2024Updated last year