bee-san / Name-That-HashLinks
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
☆1,626Updated last month
Alternatives and similar repositories for Name-That-Hash
Users that are interested in Name-That-Hash are comparing it to the libraries listed below
Sorting:
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,392Updated 10 months ago
- Hash type identifier (CLI & lib)☆935Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,921Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,473Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,458Updated 10 months ago
- Fancy reverse and bind shell handler☆2,864Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,417Updated 3 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,309Updated last year
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,582Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,338Updated last year
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,316Updated last month
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,516Updated last month
- ☆1,843Updated 2 weeks ago
- Rockyou for web fuzzing☆2,998Updated 4 months ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,085Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,462Updated last month
- Local file inclusion exploitation tool☆917Updated 3 months ago
- Contextual Content Discovery Tool☆3,064Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,781Updated 2 weeks ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,231Updated 7 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,480Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwords☆626Updated last year
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,276Updated last year
- Real-world infosec wordlists, updated regularly☆1,612Updated this week
- 🐧 Abuse of Google Colab for cracking hashes.☆967Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,585Updated 2 months ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆2,368Updated last year
- Reverse proxies cheatsheet☆1,852Updated 2 years ago
- Dangerously fast DNS/network/port scanner☆921Updated 3 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆765Updated 3 years ago