singe's grep - a fast grep using single-file parallelism
☆47Oct 29, 2022Updated 3 years ago
Alternatives and similar repositories for singrep
Users that are interested in singrep are comparing it to the libraries listed below
Sorting:
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆20Jun 26, 2014Updated 11 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- Blogging system in Modern Perl☆11Jan 3, 2019Updated 7 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Random Hashcat Scrips☆36Oct 12, 2024Updated last year
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- Parse greppable Nmap output as a tree☆14Nov 13, 2022Updated 3 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- ☆18Oct 17, 2017Updated 8 years ago
- General scripts that gather information out of Active Directory☆16Jun 9, 2022Updated 3 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- ☆18Mar 14, 2023Updated 2 years ago
- ☆18Feb 14, 2019Updated 7 years ago