wisepythagoras / hashcrackerLinks
Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.
☆16Updated 5 years ago
Alternatives and similar repositories for hashcracker
Users that are interested in hashcracker are comparing it to the libraries listed below
Sorting:
- misc scripts☆20Updated 3 weeks ago
- Google dorks generator to find open shells (on government sites)☆28Updated 11 years ago
- Scripts for producing release artefacts and signing, pushing and verifyig them. Note: This is superseded by OpenVPN/openvpn-build.☆11Updated 3 years ago
- A simple Golang program to collect proxies☆13Updated 6 years ago
- Scripts for pentesting/hacking☆17Updated 3 years ago
- Parallel password cracker. Supports NTLM, LM, MD5, MD4, SHA1, SHA224, SHA256, SHA384, and SHA512.☆40Updated 4 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- Automating and Enhancing Nmap using Python☆16Updated 7 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 8 years ago
- Generate word list by combining inputted words or by permutaing characters.☆13Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 11 years ago
- Collating patches for gpart from all distributions☆30Updated 2 years ago
- ParrotSec rootfs arm (armhf at the moment) builder.☆17Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- Search without being tracked-(Your Own Private Search Engine )☆18Updated 4 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- ☆29Updated 8 years ago
- Python wrapper for 3WiFi Wireless Database (https://3wifi.stascorp.com/)☆13Updated 5 years ago
- A simple C# md5 hash password cracker using wordlists , A Console application.☆13Updated 7 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- Wardriving ekoparty☆15Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- A software having all stuff related to proxy☆11Updated 2 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆55Updated last year
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 10 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 10 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Updated 8 years ago
- A repository of Tor hidden services.☆65Updated 4 years ago