bee-san / Name-That-HashLinks
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
☆1,569Updated 3 months ago
Alternatives and similar repositories for Name-That-Hash
Users that are interested in Name-That-Hash are comparing it to the libraries listed below
Sorting:
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,359Updated 3 months ago
- Hash type identifier (CLI & lib)☆880Updated 3 weeks ago
- Fancy reverse and bind shell handler☆2,760Updated 10 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,870Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,246Updated 9 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,400Updated 3 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,350Updated 2 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,400Updated 10 months ago
- File upload vulnerability scanner and exploitation tool.☆3,218Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,333Updated 3 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,445Updated 2 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,415Updated 6 months ago
- Rockyou for web fuzzing☆2,838Updated last month
- Notes about attacking Jenkins servers☆2,062Updated 11 months ago
- Monitor linux processes without root permissions☆5,511Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,280Updated 8 months ago
- ☆1,739Updated 3 weeks ago
- Fetch all the URLs that the Wayback Machine knows about for a domain☆3,975Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,179Updated last year
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,223Updated 2 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,059Updated last month
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆2,203Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,449Updated 2 weeks ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,871Updated 11 months ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆1,898Updated 7 months ago
- A curated list of amazingly awesome Burp Extensions☆3,214Updated 4 months ago
- Find domains and subdomains related to a given domain☆3,330Updated last year
- Reverse proxies cheatsheet☆1,822Updated last year
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,354Updated last week
- An OOB interaction gathering server and client library☆3,823Updated this week