A tool for recovering credentials from sniffed PPPoE, RADIUS and L2TPv2 CHAP authentications
☆18Apr 25, 2016Updated 9 years ago
Alternatives and similar repositories for dechap
Users that are interested in dechap are comparing it to the libraries listed below
Sorting:
- A full Python implementation of the WPA2 encryption algorithm, using no encryption libraries☆18Nov 18, 2016Updated 9 years ago
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆25Nov 30, 2021Updated 4 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 8 months ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Implemented a data structure that will help solve a simplified version of the mobile phone tracking problem, i.e., the fundamental proble…☆12Oct 18, 2018Updated 7 years ago
- Fork of spirit2_free only for QualComm based processors.☆14Jan 17, 2020Updated 6 years ago
- Terminal with voice AI and banner☆13Jul 29, 2025Updated 7 months ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- The modified bcmon from google code☆11Aug 23, 2022Updated 3 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- BlurSPY app is a very useful cell phone tracking application, which features a number of useful functions. If it is installed on the targ…☆11Dec 16, 2021Updated 4 years ago
- Database dumper written in python3. Usefull during pentesting and CTFs.☆11Oct 10, 2024Updated last year
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- Upload SQLite database files to Datasette☆14Nov 10, 2025Updated 3 months ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- A GUI application for managing Solo v2 security keys☆11Updated this week
- ☆12May 22, 2018Updated 7 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- A MyBB plugin that upgrades the password hash algorithm and converts old passwords on the fly.☆10Nov 17, 2023Updated 2 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- ☆11Sep 3, 2020Updated 5 years ago
- Tools for WD My Cloud Home☆11Jun 21, 2020Updated 5 years ago
- a mechanism to transfer digital credentials securely between two devices☆12Feb 14, 2023Updated 3 years ago
- Hey, Elon Chrome Extension☆12Nov 9, 2022Updated 3 years ago
- 🗝 BotNet ( .NET ) Source Codes☆14May 2, 2024Updated last year
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Random one-offs that need a temporary home☆12Jan 28, 2026Updated last month
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- A small tool to export your "attachments" (screenshots/images) from your discord backups☆10Aug 10, 2022Updated 3 years ago
- make requests to apples bssid database☆13May 27, 2024Updated last year
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Bot na telegrama pobierający promocję z polskich sklepów z elektroniką☆10Nov 15, 2024Updated last year