Given a string determine the possible hashing algorithms used to produce that string.
☆17Nov 23, 2020Updated 5 years ago
Alternatives and similar repositories for hashid
Users that are interested in hashid are comparing it to the libraries listed below
Sorting:
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- dump network packet and log to database☆10Jul 24, 2022Updated 3 years ago
- FreeBSD service daemon for KBFS, the Keybase filesystem☆13Jul 22, 2021Updated 4 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A modern CLI for Tenable.io written in Go☆14Nov 28, 2020Updated 5 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 3 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆20Mar 28, 2018Updated 7 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- A go-smtp-server backend that proxies messages to another SMTP server☆26Jul 11, 2021Updated 4 years ago
- Load a dll file received from the network to the loader process or another process.☆10Jul 21, 2020Updated 5 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 4 months ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- Now you won't miss the moment the domain expires.☆27Oct 13, 2025Updated 4 months ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆214May 5, 2022Updated 3 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- ☆110May 14, 2018Updated 7 years ago
- Cross platform retrieval of system proxy configurations☆62Aug 13, 2025Updated 6 months ago
- Security tool to quickly audit Public Box files and folders.☆54Sep 29, 2019Updated 6 years ago
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- SSH/HTTP demuxing and proxying server☆26Oct 30, 2025Updated 4 months ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- 802.11 IDS, visualizer, and analytics platform for the web☆29Jan 4, 2023Updated 3 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Totally self-contained SSH reverse tunnel written in Go☆83Mar 12, 2021Updated 4 years ago
- Mass DNS resolution tool☆37Jan 1, 2026Updated 2 months ago
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago