Identify the different types of hashes used to encrypt passwords.
☆10Mar 12, 2017Updated 9 years ago
Alternatives and similar repositories for Hatwitch
Users that are interested in Hatwitch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MD5, SHA1 and WordPress Decryptor☆26Jan 16, 2018Updated 8 years ago
- 这个项目存放了我编写的所有关于监控设备的脚本,并使用flask搭建WEB展示扫描的结果☆10Feb 21, 2017Updated 9 years ago
- Scripts desenvolvidos por mim em Python para pesquisas de segurança e levantamentos de vulnerabilidades.☆15Nov 29, 2017Updated 8 years ago
- ☆16Jun 28, 2025Updated 8 months ago
- ☆10Jul 14, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- PS Vita ELF/PRX2 (symbol) loader plugin for Binary Ninja☆19Oct 23, 2024Updated last year
- ✍️ A browser add-on (Firefox, Chrome, Thunderbird) that allows you to autocorrect common text sequences and convert text characters to a …☆12Feb 9, 2026Updated last month
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Spartacus is a multi-purpose library written in C#.☆24Jun 23, 2017Updated 8 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- MultiMerch Digital Marketplace Core – Multivendor for OpenCart☆11Oct 1, 2015Updated 10 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- ☆15May 22, 2023Updated 2 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Firmware validation of Apple T1 and prior Macs☆26Feb 18, 2022Updated 4 years ago
- discontinued☆527Aug 17, 2023Updated 2 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- suckless ramdisk tool for iOS8+☆14Sep 23, 2022Updated 3 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 5 months ago
- opencart seo module☆12Jul 17, 2013Updated 12 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- Check whether a Grin Wallet is Reachable or not☆10Apr 9, 2021Updated 4 years ago
- modernized and C99 compliant port of p0f (Passive OS fingerprinting)☆20Sep 17, 2018Updated 7 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- HackThis!!☆46Oct 20, 2019Updated 6 years ago
- 开源库QSsh实现的Linux安全检查工具。 利用ssh协议登录linux主机并通过shell组合执行命令。 获取Linux主机的主机信息、网卡信息、内存信息、防火墙配置、文件修改时间,简易版本。 图形化显示。☆18Nov 17, 2016Updated 9 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- The first visual page builder for Opencart 2 (version 2.3.0.0 and up)☆10May 25, 2017Updated 8 years ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago