bee-san / Name-That-HashLinks
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
☆1,583Updated 5 months ago
Alternatives and similar repositories for Name-That-Hash
Users that are interested in Name-That-Hash are comparing it to the libraries listed below
Sorting:
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,369Updated 5 months ago
- Hash type identifier (CLI & lib)☆890Updated last week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,879Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,413Updated 4 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,393Updated this week
- Software to identify the different types of hashes used to encrypt data and especially passwords☆610Updated last year
- 🐧 Abuse of Google Colab for cracking hashes.☆952Updated 2 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,343Updated 2 weeks ago
- ☆1,757Updated 2 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,243Updated 3 months ago
- Fancy reverse and bind shell handler☆2,784Updated last year
- Rockyou for web fuzzing☆2,862Updated 2 weeks ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,155Updated last year
- Contextual Content Discovery Tool☆2,927Updated last year
- Reverse proxies cheatsheet☆1,835Updated last year
- 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...☆1,741Updated 2 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,354Updated 5 months ago
- Local file inclusion exploitation tool☆881Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,270Updated 10 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,427Updated last year
- CeWL is a Custom Word List Generator☆2,307Updated 9 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,086Updated last month
- A tool to dump a git repository from a website☆2,228Updated 8 months ago
- Real-world infosec wordlists, updated regularly☆1,544Updated this week
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,205Updated last year
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆1,960Updated 8 months ago
- Notes about attacking Jenkins servers☆2,072Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,802Updated last year
- Automatic Enumeration Tool based in Open Source tools☆928Updated last year