bee-san / Name-That-HashLinks
๐ Don't know what type of hash it is? Name That Hash will name that hash type! ๐ค Identify MD5, SHA256 and 300+ other hashes โ Comes with a neat web app ๐ฅ
โ1,612Updated 8 months ago
Alternatives and similar repositories for Name-That-Hash
Users that are interested in Name-That-Hash are comparing it to the libraries listed below
Sorting:
- ๐Searches Hash APIs to crack your hash quickly๐ If hash is not found, automatically pipes into HashCatโกโ1,389Updated 8 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.โ1,470Updated 3 years ago
- Hash type identifier (CLI & lib)โ919Updated 2 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and โฆโ1,906Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.โ1,442Updated 8 months ago
- Rockyou for web fuzzingโ2,958Updated 3 months ago
- โ1,800Updated 3 weeks ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.โ1,574Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwordsโ621Updated last year
- Fancy reverse and bind shell handlerโ2,844Updated last year
- Dangerously fast DNS/network/port scannerโ922Updated 3 years ago
- Generates millions of keyword-based password mutations in seconds.โ1,377Updated 5 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.โ1,293Updated 7 months ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.โ1,249Updated last year
- Contextual Content Discovery Toolโ3,028Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huโฆโ2,277Updated last year
- Real-world infosec wordlists, updated regularlyโ1,593Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fโฆโ4,308Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)โ1,410Updated 9 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secuโฆโ1,473Updated 2 months ago
- 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...โ1,773Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.โ1,400Updated 10 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiโฆโ2,391Updated last month
- ๐ง Abuse of Google Colab for cracking hashes.โ963Updated 2 years ago
- ๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shโ3,549Updated 2 weeks ago
- ๐ฆ๐ Awesome list of secrets in environment variables ๐ฅ๏ธโ899Updated 3 years ago
- Reverse proxies cheatsheetโ1,854Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entโฆโ2,042Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.โ2,743Updated last week
- Small, fast tool for performing reverse DNS lookups en masse.โ1,539Updated last year