SmeegeSec / HashTag
Password Hash Identification
☆220Updated 11 years ago
Alternatives and similar repositories for HashTag:
Users that are interested in HashTag are comparing it to the libraries listed below
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Shodan HQ nmap plugin - passively scan targets☆153Updated 9 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- myBFF - a Brute Force Framework☆140Updated 2 months ago
- Automated digital reconnaissance☆197Updated 2 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- ☆181Updated 11 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 9 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- Subdomain Analyzer☆76Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Git manager for pentesters☆107Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Some exploits and exploit development stuff.☆147Updated 3 years ago
- ☆241Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 9 months ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆185Updated 8 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 9 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago