Crackhash is a tool that try to crack different types of hashes using free online services.
☆25Oct 29, 2019Updated 6 years ago
Alternatives and similar repositories for crackhash
Users that are interested in crackhash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Generating private keys from passphrases, checking transactions and ballances. Sweeping bitcoins by importing private keys into blockchai…☆23Nov 29, 2014Updated 11 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Apr 20, 2026Updated 2 weeks ago
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆36Dec 7, 2022Updated 3 years ago
- Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da cha…☆12Dec 7, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆20Jun 20, 2022Updated 3 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- The code repository for the dSploit project update server.☆14Jun 17, 2014Updated 11 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Jan 6, 2018Updated 8 years ago
- ☆14Jul 23, 2023Updated 2 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆30Dec 7, 2022Updated 3 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- Generate random test credit card numbers for testing, validation and/or verification purposes.☆12Nov 28, 2021Updated 4 years ago
- Simple, production ready, HTTP server for static file serving☆12Apr 1, 2023Updated 3 years ago
- It attempts to crack social networks using a brute force dictionary attack.☆350May 3, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Use Python to manipulate Charles session files and send HTTP requests.☆13Dec 8, 2022Updated 3 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 9 years ago
- ☆14Feb 9, 2020Updated 6 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- gorobots - robots.txt recon & path discovery in Go. Structured parsing, 29-category sensitivity classification, concurrent path probing, …☆16Apr 10, 2026Updated 3 weeks ago
- ☆14Mar 15, 2020Updated 6 years ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- String / Text / Byte Array / File / Web URL - hash viewer (CRC32, MD5, RIPEMD160, SHA1/256/384/512)☆17Aug 22, 2023Updated 2 years ago
- The source code of iDecryptIt - an IPSW firmware decryption tool☆17Mar 11, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Crack encrypted master Key and ckey of a bitcoin wallet(POC)☆17Sep 1, 2022Updated 3 years ago
- Tools for btc hacking☆15Feb 21, 2021Updated 5 years ago
- ☆29Apr 16, 2020Updated 6 years ago
- ☆176Jul 5, 2023Updated 2 years ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated 2 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- URLs very strong obfuscation tool (can be used in requests too)☆18Oct 3, 2024Updated last year