tkisason / unhash
unhash is a set of tools designed to enable better password auditing
☆119Updated 2 years ago
Alternatives and similar repositories for unhash:
Users that are interested in unhash are comparing it to the libraries listed below
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- ☆53Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆140Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- ☆25Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆50Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- a grep -r for secrets☆176Updated 2 years ago
- ☆45Updated 7 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Mass scanning and fuzzing library☆49Updated 6 years ago
- Collection of metasploit modules☆66Updated 7 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 10 years ago
- Mass zone transfer python script☆15Updated 8 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- ☆112Updated 7 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Updated 7 years ago