Hash identification program.
☆152Feb 13, 2022Updated 4 years ago
Alternatives and similar repositories for houndsniff
Users that are interested in houndsniff are comparing it to the libraries listed below
Sorting:
- Modular personalized dictionary generator.☆212Aug 15, 2024Updated last year
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- Different AI stuff to IRC bot☆12Oct 10, 2025Updated 4 months ago
- ☆12Dec 14, 2021Updated 4 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Mar 7, 2023Updated 2 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆635May 8, 2024Updated last year
- Send keyboard events with Golang☆21Nov 5, 2023Updated 2 years ago
- Below are some simple methods for exiting vim.☆20Sep 25, 2019Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- USBNinja Android Remote Control Application☆32Feb 19, 2019Updated 7 years ago
- Download your NewPipe created playlists as mp3, wav or other codec and listen to it offline. It is also possible to export the playlists …☆33Jan 31, 2026Updated last month
- A BOF to automate common persistence tasks for red teamers☆295Mar 7, 2023Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- A Flask extension to obtain useful information from your PostgreSQL database.☆32Mar 28, 2022Updated 3 years ago
- ☆36Sep 16, 2024Updated last year
- ☆33Apr 7, 2020Updated 5 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- ☆37Nov 6, 2020Updated 5 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Sep 19, 2022Updated 3 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Simple MapReduce implementation in Python, for text file parallel processing☆20Mar 3, 2012Updated 14 years ago
- ☆12Apr 26, 2024Updated last year
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- A kinetic model for lignin pyrolysis☆11Apr 25, 2017Updated 8 years ago
- This repo contains example code which demonstrates how to receive and decode the streamed data of 3D and 2D laser scanners.☆14Sep 27, 2024Updated last year
- USB rubber ducky reverse shell with disabling windows defender☆12Apr 17, 2021Updated 4 years ago
- Some examples with the neat-python module to assist the computer to play games!☆10Feb 7, 2021Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Arabic Word-Embedding (Word2vec) model training from Wikipedia articles☆11Dec 13, 2018Updated 7 years ago