spyboy-productions / CrabCryptLinks
CrabCrypt is a secure file encryption tool with GUI, designed for effortlessly encrypting and decrypting any file. With AES encryption and a sleek Tkinter interface, CrabCrypt ensures your files remain confidential and protected from unauthorized access.
☆14Updated 2 months ago
Alternatives and similar repositories for CrabCrypt
Users that are interested in CrabCrypt are comparing it to the libraries listed below
Sorting:
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆67Updated 9 months ago
- Bypass 403☆147Updated 3 months ago
- Automatic tool to find Google Dorks☆35Updated 7 months ago
- ☆53Updated 5 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 6 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆142Updated 2 weeks ago
- ☆65Updated last year
- autoreport generates bug report templates for security researchers☆20Updated last year
- ☆37Updated 2 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆64Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆115Updated 5 months ago
- ☆86Updated 2 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 10 months ago
- [Custom || Automated] Curation & Collection of BugBounty Wordlists☆50Updated this week
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 4 months ago
- ☆57Updated 9 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆91Updated 9 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated last month
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆122Updated 9 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆63Updated 7 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆31Updated 9 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆194Updated 5 months ago
- Payload for bug bounty☆93Updated 11 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆149Updated 6 months ago
- ☆119Updated last year
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆43Updated 3 months ago
- Automation tool to testing and confirm the xss vulnerability.☆248Updated 2 months ago
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆123Updated 6 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆61Updated 7 months ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated last year