bee-san / Name-That-Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
☆1,532Updated this week
Alternatives and similar repositories for Name-That-Hash:
Users that are interested in Name-That-Hash are comparing it to the libraries listed below
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,326Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,832Updated 2 years ago
- Rockyou for web fuzzing☆2,721Updated last week
- Hash type identifier (CLI & lib)☆842Updated last month
- ☆1,653Updated last week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,146Updated 5 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,099Updated 8 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,355Updated 7 months ago
- Fancy reverse and bind shell handler☆2,712Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,385Updated 2 years ago
- All In One Web Recon☆2,370Updated 4 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,268Updated 7 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,356Updated 2 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,217Updated 2 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,340Updated 8 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,288Updated 2 months ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,786Updated 7 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,944Updated this week
- CeWL is a Custom Word List Generator☆2,143Updated 4 months ago
- A script that you can run in the background!☆2,803Updated 7 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,764Updated 4 months ago
- A curated list of amazingly awesome Burp Extensions☆3,087Updated 3 weeks ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,156Updated 10 months ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,124Updated 7 months ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆2,106Updated 9 months ago
- Monitor linux processes without root permissions☆5,243Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆1,825Updated 3 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,272Updated 2 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,817Updated 6 months ago
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆3,987Updated this week