MichaelDim02 / houndsniffLinks
Hash identification program.
☆153Updated 3 years ago
Alternatives and similar repositories for houndsniff
Users that are interested in houndsniff are comparing it to the libraries listed below
Sorting:
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 8 months ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Modular personalized dictionary generator.☆215Updated last year
- Tryhackme rooms & tools☆65Updated 5 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆455Updated last year
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆367Updated 4 years ago
- large hashcat rulesets generated from real-world compromised passwords☆398Updated 5 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆405Updated 4 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆570Updated last year
- A curated reading list about offensive IT security☆145Updated 3 months ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆196Updated 3 years ago
- Fake msfconsole for the use in demonstrations☆20Updated 5 years ago
- ☆133Updated 4 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆227Updated 3 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆248Updated 5 months ago
- Various wordlists FR & EN - Cracking French passwords☆301Updated last week
- tool for generating wordlists or extending an existing one using mutations.☆389Updated 5 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆258Updated 3 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆292Updated 3 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆387Updated 4 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆403Updated 10 months ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆414Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,388Updated 9 months ago
- 🐧 Abuse of Google Colab for cracking hashes.☆963Updated 2 years ago
- Pentester's Promiscuous Notebook☆523Updated 3 weeks ago
- A web front-end for password cracking and analytics☆385Updated last month
- Fetch, install and search wordlist archives from websites and torrent peers.☆524Updated last year
- PowerShell scripts for communicating with a remote host.☆306Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆744Updated last month