GitHub Mirror of Hash-Identifier
☆32Jan 26, 2012Updated 14 years ago
Alternatives and similar repositories for Hash-Identifier
Users that are interested in Hash-Identifier are comparing it to the libraries listed below
Sorting:
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- NO LONGER MAINTAINED A library for working with time and date series in Python☆45Nov 30, 2018Updated 7 years ago
- 一些实用的python脚本☆10Feb 5, 2017Updated 9 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- alfredapp v2 workflow: 使用 ip138 来查询 ip 归属地☆24Apr 19, 2013Updated 12 years ago
- HCTF 2017 线下赛平台☆14Dec 17, 2017Updated 8 years ago
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- 基于HoneyPy可视化蜜罐,visualization Honeypot based on HoneyPy☆16Mar 23, 2017Updated 8 years ago
- An implementation of jpnevulator in Python☆21Jan 30, 2018Updated 8 years ago
- writeup about XDCTF 2015☆62Oct 8, 2015Updated 10 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- E4's C2 server☆21Oct 12, 2020Updated 5 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 8 months ago
- ☆14May 13, 2018Updated 7 years ago
- 中国民航大学第四届“西普杯”信息安全竞赛 - 题目源程序和Writeup☆21Oct 18, 2020Updated 5 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- a little scan for path☆71Aug 20, 2016Updated 9 years ago
- Try various exploits to get root☆19Nov 14, 2013Updated 12 years ago
- DirBuster successor in Erlang☆37Feb 16, 2017Updated 9 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- node / redis sha hash cracker☆42Nov 3, 2013Updated 12 years ago
- Backdoor with Golang (Cross-Plateform)☆17Feb 17, 2022Updated 4 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Feb 1, 2024Updated 2 years ago
- Platform for hosting CTFs. Node.js is the only real dev language.☆24Dec 19, 2014Updated 11 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- fix time for java application using javaAgent☆24Dec 3, 2017Updated 8 years ago