HatBashBR / HatwitchLinks
Identify the different types of hashes used to encrypt passwords.
☆10Updated 8 years ago
Alternatives and similar repositories for Hatwitch
Users that are interested in Hatwitch are comparing it to the libraries listed below
Sorting:
- ☆24Updated 10 years ago
- Web interface for recon-ng☆14Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Updated 9 years ago
- Password cracking utility☆54Updated 4 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- ☆15Updated 9 years ago
- ☆47Updated 10 years ago
- ☆20Updated 12 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- ☆15Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Software exploitation training material☆16Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- ☆84Updated 2 years ago
- Ransomware Detection Test PowerShell Script☆11Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 9 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 8 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 9 years ago