IRC bot for cracking hashes
☆18Apr 6, 2021Updated 5 years ago
Alternatives and similar repositories for HashBot
Users that are interested in HashBot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Password cracking utility☆54Apr 6, 2021Updated 5 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- ☆19Apr 29, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆83May 9, 2014Updated 11 years ago
- Small, one-off scripts for security related stuff I've written over time☆37Mar 2, 2025Updated last year
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- ☆19Oct 28, 2018Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- ☆12Aug 29, 2025Updated 7 months ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- ☆128Jun 12, 2015Updated 10 years ago