Hash cracker
☆57Apr 7, 2018Updated 7 years ago
Alternatives and similar repositories for findmyhash
Users that are interested in findmyhash are comparing it to the libraries listed below
Sorting:
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- Dig through Git commits and logs☆21Jan 8, 2019Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 11 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Spiders a website using the darknet via Tor☆12Jun 18, 2017Updated 8 years ago
- Tools for working with InnoDB☆23Dec 20, 2016Updated 9 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- Compiler plugin for performance analysis of HIP applications☆13Apr 7, 2025Updated 11 months ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Search drives for documents containing passwords☆65Jul 11, 2014Updated 11 years ago
- ☆19May 31, 2017Updated 8 years ago
- Fuck capstone.CsError: Different API version between core & binding (CS_ERR_VERSION)☆13Nov 16, 2017Updated 8 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- A client to facilitate simple RESTful requests☆18Sep 7, 2010Updated 15 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A wordlist analyzer framework written in Python and distributed on PyPi.☆10Mar 2, 2025Updated last year