bee-san / Search-That-HashLinks
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
☆1,369Updated 5 months ago
Alternatives and similar repositories for Search-That-Hash
Users that are interested in Search-That-Hash are comparing it to the libraries listed below
Sorting:
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,583Updated 5 months ago
- 🐧 Abuse of Google Colab for cracking hashes.☆952Updated 2 years ago
- Hash type identifier (CLI & lib)☆890Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,413Updated 4 months ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆648Updated 2 years ago
- Fetch information about a public Google document.☆945Updated last year
- All In One Web Recon☆2,502Updated 3 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,879Updated 2 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆751Updated 3 years ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,056Updated 3 years ago
- Search for leaked credentials☆1,346Updated 4 years ago
- 🐙 Track down GitHub users.☆928Updated 3 weeks ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,137Updated 2 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,061Updated last year
- LinkedIn Recon Tool☆1,168Updated 2 years ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,373Updated last year
- OSINT tools and more but without API key☆1,366Updated last month
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,243Updated 3 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,086Updated last month
- CrackQ: A Python Hashcat cracking queue system☆937Updated 11 months ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,334Updated 3 weeks ago
- Dangerously fast DNS/network/port scanner☆911Updated 3 years ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆835Updated 3 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆393Updated 3 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,141Updated 2 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,343Updated 2 weeks ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,393Updated last week
- Fetch, install and search wordlist archives from websites and torrent peers.☆516Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,332Updated 2 months ago