Automatic detection of hashing algorithms
☆20Jun 18, 2016Updated 9 years ago
Alternatives and similar repositories for hasher
Users that are interested in hasher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- a flow/node based UI framework for React and JavaScript☆13Sep 20, 2023Updated 2 years ago
- "The Legend of Zelda: Majora's Mask 3D" savedata RE☆10Jul 6, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- tools for vita☆28Sep 21, 2018Updated 7 years ago
- 34C3 demo☆16Feb 19, 2018Updated 8 years ago
- IDA Pro module for Toshiba MeP processors☆37Dec 31, 2018Updated 7 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Jul 22, 2016Updated 9 years ago
- Ninjhax with kernel access and other fun things☆14May 17, 2015Updated 10 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- Main hub of the RE1CR Mod-sdk, tools for it, and general data.☆22Aug 3, 2025Updated 8 months ago
- zer0m0n driver for cuckoo sandbox☆86Jul 12, 2016Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- thud - the bouncer that doesn't☆23Jun 30, 2012Updated 13 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- ☆10Sep 13, 2018Updated 7 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- Marker Basics Tutorial☆12Mar 23, 2018Updated 8 years ago
- end-to-end encrypted exchange (e3x) implemented in pure javascript☆77Feb 2, 2017Updated 9 years ago
- Node kickass.to json API wrapper☆21Jul 26, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- ☆13Jul 31, 2016Updated 9 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Golang bindings for Uber API☆16Apr 7, 2015Updated 11 years ago
- QR-code exploit for Freakyforms Deluxe (3DS)☆50Jun 26, 2017Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆37May 4, 2016Updated 9 years ago
- Terrier's desktop search demo product☆13Aug 2, 2018Updated 7 years ago
- Telehash in Objective-C for iOS and OSX☆25Jul 9, 2015Updated 10 years ago
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- Unpacking tool for Inno Setup installers☆39Mar 9, 2024Updated 2 years ago
- Corpora used to seed NSS' fuzzing targets☆10Apr 1, 2026Updated last week
- A simple file-server which runs on top of Github pages☆25Aug 16, 2020Updated 5 years ago
- ☆10Mar 2, 2017Updated 9 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Jan 25, 2016Updated 10 years ago
- A curated list of Chinese websites and personal blogs about ethical hacking and pentesting☆112Oct 8, 2020Updated 5 years ago