IRC bot for cracking hashes
☆18Apr 6, 2021Updated 5 years ago
Alternatives and similar repositories for HashBot
Users that are interested in HashBot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Password cracking utility☆54Apr 6, 2021Updated 5 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- ☆19Apr 29, 2015Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 11 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆83May 9, 2014Updated 11 years ago
- Small, one-off scripts for security related stuff I've written over time☆37Mar 2, 2025Updated last year
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- ☆19Oct 28, 2018Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- ☆12Aug 29, 2025Updated 8 months ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago