skickar / CatGotYourPasswordLinks
Repo for Missoula class
☆23Updated last year
Alternatives and similar repositories for CatGotYourPassword
Users that are interested in CatGotYourPassword are comparing it to the libraries listed below
Sorting:
- ☆23Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆77Updated 11 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Hacker bootsplash themes just like in the movie!☆52Updated last year
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆50Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Combine and clean word lists☆92Updated 2 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- ☆34Updated 9 months ago
- Rust-based password mutator for brute force attacks☆13Updated 6 months ago
- ☆11Updated 9 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- ☆11Updated 4 years ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆98Updated 2 years ago
- Signing-key abuse and update exploitation framework☆130Updated 4 months ago
- ssh jump host appliance☆26Updated 3 years ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆155Updated last month
- Network Traffic Fuzzer☆18Updated 9 months ago
- ☆32Updated 6 years ago
- Bruteforce with a stream of permutations of a specific pattern☆27Updated 2 months ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆16Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- Hash cracking WebApp & Server for hashcat☆46Updated 3 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 9 months ago