wisepythagoras / hashcrackerLinks
Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.
☆15Updated 5 years ago
Alternatives and similar repositories for hashcracker
Users that are interested in hashcracker are comparing it to the libraries listed below
Sorting:
- Scripts for producing release artefacts and signing, pushing and verifyig them. Note: This is superseded by OpenVPN/openvpn-build.☆11Updated 2 years ago
- a multi-browser extension to encrypt and decrypt textual data using SHA256 algorithm☆18Updated 3 months ago
- Google dorks generator to find open shells (on government sites)☆29Updated 11 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 7 years ago
- Vulnerability scanner☆14Updated 6 years ago
- Search without being tracked-(Your Own Private Search Engine )☆18Updated 4 years ago
- Parallel password cracker. Supports NTLM, LM, MD5, MD4, SHA1, SHA224, SHA256, SHA384, and SHA512.☆40Updated 4 years ago
- Python wrapper for 3WiFi Wireless Database (https://3wifi.stascorp.com/)☆13Updated 5 years ago
- Automating and Enhancing Nmap using Python☆17Updated 7 years ago
- Scan suspicious applications with over 60 different anti-viruses with a mere two clicks and five seconds!☆40Updated 2 years ago
- A simple C# md5 hash password cracker using wordlists , A Console application.☆14Updated 7 years ago
- Scripts for pentesting/hacking☆18Updated 3 years ago
- Generate random wordlist to test your passwords' security☆13Updated 3 years ago
- misc scripts☆20Updated 6 months ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 5 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆55Updated last year
- A repository of Tor hidden services.☆64Updated 3 years ago
- cSploit traffic manipulator☆30Updated 8 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 10 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 10 years ago
- Disconnects client from router☆14Updated 8 years ago
- A simple Golang program to collect proxies☆13Updated 6 years ago
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆54Updated 5 years ago
- [BASH] Password generator through a wordlist☆12Updated 12 years ago
- Generate word list by combining inputted words or by permutaing characters.☆13Updated 7 years ago
- NetcatGUI is a simple GUI program that is set to emulate the popular network "swiss army knife" tool netcat (nc) using an easy to use gra…☆43Updated 3 years ago
- Arch Linux Metasploit Framework Installation Script☆13Updated 5 years ago
- Some NSE scripts to search information from routers☆10Updated 10 years ago
- Find all cool documents on GOV and Info sites☆18Updated 6 years ago