Hashcat wrapper to help automate the cracking process
☆119Apr 16, 2018Updated 7 years ago
Alternatives and similar repositories for autocrack
Users that are interested in autocrack are comparing it to the libraries listed below
Sorting:
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ☆21Apr 16, 2023Updated 2 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Convert TI SmartRF Bluetooth Low Energy Packet Captures to Libpcap Format☆18Dec 11, 2014Updated 11 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Apr 7, 2023Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆22Oct 1, 2016Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Password lists generated by deep learning algorithms.☆34Jan 20, 2020Updated 6 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 6 years ago
- Create Password lists for cracking lyrical passwords☆17May 11, 2024Updated last year
- Joomla Vulnerability Component Scanner☆62Sep 28, 2018Updated 7 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆63Aug 27, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago