bee-san / Name-That-HashLinks
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
☆1,592Updated 5 months ago
Alternatives and similar repositories for Name-That-Hash
Users that are interested in Name-That-Hash are comparing it to the libraries listed below
Sorting:
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,378Updated 5 months ago
- Hash type identifier (CLI & lib)☆895Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,461Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,883Updated 2 years ago
- Fancy reverse and bind shell handler☆2,802Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,417Updated 5 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,254Updated 4 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,411Updated 3 weeks ago
- CeWL is a Custom Word List Generator☆2,342Updated 10 months ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,165Updated last year
- Contextual Content Discovery Tool☆2,936Updated last year
- 🐧 Abuse of Google Colab for cracking hashes.☆954Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,100Updated last month
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,282Updated 11 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,354Updated 2 weeks ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆1,978Updated 9 months ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆609Updated last year
- Rockyou for web fuzzing☆2,875Updated this week
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,569Updated last year
- 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...☆1,747Updated 2 years ago
- Generates millions of keyword-based password mutations in seconds.☆1,337Updated 2 months ago
- ☆1,770Updated 2 months ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,535Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,215Updated last year
- Dangerously fast DNS/network/port scanner☆913Updated 3 years ago
- Real-world infosec wordlists, updated regularly☆1,554Updated this week
- A tool to dump a git repository from a website☆2,262Updated last week
- A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.☆1,824Updated last year
- Local file inclusion exploitation tool☆882Updated 2 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆752Updated 3 years ago