HatBashBR / HatwitchLinks
Identify the different types of hashes used to encrypt passwords.
☆11Updated 8 years ago
Alternatives and similar repositories for Hatwitch
Users that are interested in Hatwitch are comparing it to the libraries listed below
Sorting:
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Software exploitation training material☆15Updated 8 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- ☆24Updated 9 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 9 years ago
- Password cracking utility☆53Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A full-fledged msfrpc library for Metasploit framework.☆8Updated 8 years ago
- ☆23Updated 11 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 8 months ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- ☆47Updated 9 years ago
- ☆12Updated 10 years ago
- Framework for Man-In-The-Middle attacks☆16Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- ☆11Updated 11 years ago