thanosgn / rainbow-table-attackLinks
A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.
☆15Updated 8 years ago
Alternatives and similar repositories for rainbow-table-attack
Users that are interested in rainbow-table-attack are comparing it to the libraries listed below
Sorting:
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- A shellcode testing harness.☆69Updated last year
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- A super micro fun implant☆23Updated 6 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆58Updated 6 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Network based protocol fuzzer☆73Updated 3 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆23Updated 16 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Sensor software☆68Updated 3 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago