bee-san / Name-That-HashLinks
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
☆1,607Updated 8 months ago
Alternatives and similar repositories for Name-That-Hash
Users that are interested in Name-That-Hash are comparing it to the libraries listed below
Sorting:
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,388Updated 8 months ago
- Hash type identifier (CLI & lib)☆917Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,471Updated 3 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,896Updated 3 years ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,291Updated 6 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,440Updated 7 months ago
- Fancy reverse and bind shell handler☆2,837Updated last year
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,468Updated last month
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,309Updated last year
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,030Updated last year
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,572Updated last year
- Rockyou for web fuzzing☆2,945Updated 2 months ago
- 🐧 Abuse of Google Colab for cracking hashes.☆963Updated 2 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,234Updated last year
- Real-world infosec wordlists, updated regularly☆1,591Updated this week
- Software to identify the different types of hashes used to encrypt data and especially passwords☆619Updated last year
- ☆1,795Updated 2 weeks ago
- Reverse proxies cheatsheet☆1,854Updated 2 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,405Updated 9 months ago
- Local file inclusion exploitation tool☆909Updated last month
- Dangerously fast DNS/network/port scanner☆922Updated 3 years ago
- Making Favicon.ico based Recon Great again !☆1,242Updated 2 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,269Updated last year
- 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...☆1,771Updated 2 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,390Updated last month
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,214Updated 2 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,212Updated 5 months ago
- Chepy is a python lib/cli equivalent of the awesome CyberChef tool.☆1,020Updated last week
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,570Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,732Updated last month