disthc
☆28Jun 9, 2014Updated 11 years ago
Alternatives and similar repositories for disthc
Users that are interested in disthc are comparing it to the libraries listed below
Sorting:
- Distributed wrapper around oclHashcat☆94Mar 17, 2025Updated 11 months ago
- Agent part of Hashtopus☆17Oct 8, 2017Updated 8 years ago
- Official python agent for using the distributed hashcracker Hashtopolis☆80Updated this week
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- ☆25May 18, 2021Updated 4 years ago
- A library for creating wrappers around command-line programs.☆32Oct 6, 2022Updated 3 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 10 years ago
- Outdated C# agent for using the distributed hashcracker Hashtopolis☆14May 18, 2021Updated 4 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 7 years ago
- Docker + Travis-CI + Cron + JohnTheRipper(Jumbo) = Bleeding edge builds☆17Mar 7, 2018Updated 8 years ago
- This small Python 3 project allows to fetch from Twitter API all the tweets you (or even another account) liked, to save them (for backup…☆20Sep 11, 2020Updated 5 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- A collection of tools used for researching passwords☆19Dec 17, 2024Updated last year
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Fully functional Windows UAC bypass for Hak5 USB rubber ducky.☆29May 11, 2015Updated 10 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- A pair of utilities to "cat" to the speaker and from the microphone on Mac OS X.☆45Nov 2, 2008Updated 17 years ago
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 2 years ago
- ☆12Dec 29, 2021Updated 4 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- Analyze and modify hashcat .restore files☆33Nov 19, 2022Updated 3 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 4 months ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- ☆10Oct 9, 2024Updated last year
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Write Perl subroutines in other programming languages☆19Jul 10, 2025Updated 7 months ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆79Sep 29, 2019Updated 6 years ago
- PANSHI X99D4(磐石至尊X99-D4)主板 OC EFI On BigSur(MacOS 11.0.1)☆10Mar 16, 2021Updated 4 years ago
- Schematic of popular OP-COM (VAUX-COM) interface☆10May 19, 2019Updated 6 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- X utilities in POSIX shell scripts.☆13Dec 20, 2021Updated 4 years ago