Cryptanalysis and attack library
☆22Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for samson
Users that are interested in samson are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- ☆14Nov 21, 2022Updated 3 years ago
- misc analysis script for hqx (hq2x hq3x hq4x) algorithms☆19Jun 21, 2014Updated 11 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- Quantum's interactive calendars, e.g. French Republican Calendar using historic equinox method for leap years.☆17Mar 5, 2026Updated 2 weeks ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- The DNS Hunt will make your life easier, and of course faster.☆48Nov 15, 2020Updated 5 years ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- helpful Quick Scripts☆36Jun 27, 2024Updated last year
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- ☆19Dec 15, 2018Updated 7 years ago
- Configure SPI flash write protection.☆24May 11, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated last month
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- R3C0Nizer is the first ever CLI based menu-driven web application B-Tier recon framework.☆152Apr 2, 2021Updated 4 years ago
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictions☆58Sep 24, 2023Updated 2 years ago
- Binary archive and installation package building script☆14Dec 24, 2025Updated 3 months ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Helps generate better emoji assets for the Telegram's Android client.☆11Jan 2, 2019Updated 7 years ago
- Running the most popular deep learning frameworks on Azure Batch AI☆25Jun 12, 2023Updated 2 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- Hacking Games in a Hacked Game☆29Apr 20, 2015Updated 10 years ago
- Fork of Python's pickle module to work with ZODB☆18Updated this week
- Go library for RTP-MIDI (WIP)☆13Feb 13, 2024Updated 2 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- ☆28Dec 7, 2016Updated 9 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- A library for building tools to determine if vulnerabilities are reachable in a code base.☆17Aug 19, 2025Updated 7 months ago
- Find PrivateKey of corresponding Pubkey(s) using Pollard Kangaroo algo☆78Jul 3, 2022Updated 3 years ago
- Node.js Bluetooth LE module☆32Dec 30, 2013Updated 12 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year