Given a string determine the possible hashing algorithms used to produce that string.
☆17Nov 23, 2020Updated 5 years ago
Alternatives and similar repositories for hashid
Users that are interested in hashid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- FreeBSD service daemon for KBFS, the Keybase filesystem☆13Jul 22, 2021Updated 4 years ago
- A modern CLI for Tenable.io written in Go☆14Nov 28, 2020Updated 5 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 3 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- ☆33Jun 12, 2024Updated last year
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated 2 weeks ago
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- ☆110May 14, 2018Updated 7 years ago
- Binary Ninja Posters☆35Oct 14, 2020Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- ☆14Feb 15, 2019Updated 7 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆215May 5, 2022Updated 3 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 4 months ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Simple utility for embedding files/resources inside golang binaries☆20Feb 20, 2021Updated 5 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- Security tool to quickly audit Public Box files and folders.☆54Sep 29, 2019Updated 6 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- 802.11 IDS, visualizer, and analytics platform for the web☆29Jan 4, 2023Updated 3 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- ☆42Jul 23, 2018Updated 7 years ago