HatBashBR / HatwitchLinks
Identify the different types of hashes used to encrypt passwords.
☆10Updated 8 years ago
Alternatives and similar repositories for Hatwitch
Users that are interested in Hatwitch are comparing it to the libraries listed below
Sorting:
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 5 months ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- CTF Writeups☆18Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Just another tool to screenshot web servers☆16Updated 2 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago