HatBashBR / HatwitchLinks
Identify the different types of hashes used to encrypt passwords.
☆11Updated 8 years ago
Alternatives and similar repositories for Hatwitch
Users that are interested in Hatwitch are comparing it to the libraries listed below
Sorting:
- ☆24Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 9 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Software exploitation training material☆16Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆30Updated 9 years ago
- ☆82Updated last year
- Automation Hacking & Penetration Testing Suite☆11Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- ☆47Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆51Updated 4 years ago
- Framework for Man-In-The-Middle attacks☆16Updated 7 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Multi source CVE/exploit parser.☆28Updated 8 years ago