SpiderLabs / masher
multiple password 'asher using Python’s hashlib
☆14Updated 3 years ago
Alternatives and similar repositories for masher:
Users that are interested in masher are comparing it to the libraries listed below
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Validate proxies for specific domain☆35Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Attempt zone transfers on domains☆17Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆15Updated 7 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- AWS Security Checks☆36Updated 7 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆42Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆10Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 4 years ago
- ☆52Updated 3 months ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- REST API backend for Reconmap☆47Updated this week