HatBashBR / HatwitchLinks
Identify the different types of hashes used to encrypt passwords.
☆11Updated 8 years ago
Alternatives and similar repositories for Hatwitch
Users that are interested in Hatwitch are comparing it to the libraries listed below
Sorting:
- Password cracking utility☆53Updated 4 years ago
- ☆24Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 9 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- ☆47Updated 9 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Perl script to test the reliability of a list of open web proxies.☆30Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- Massive arsenal of hacker tools...☆80Updated 7 years ago
- Automation Hacking & Penetration Testing Suite☆11Updated 9 years ago
- ☆20Updated 12 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 11 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆51Updated 4 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago