bee-san / pyWhatLinks
πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! π§ββοΈ
β6,980Updated last year
Alternatives and similar repositories for pyWhat
Users that are interested in pyWhat are comparing it to the libraries listed below
Sorting:
- π΅οΈββοΈ Offensive Google framework.β16,784Updated last month
- Scanning APK file for URIs, endpoints & secrets.β5,412Updated 4 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,175Updated 5 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,416Updated last year
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β19,841Updated 5 months ago
- Infection Monkey - An open-source adversary emulation platformβ6,849Updated 3 months ago
- An open-source digital image forensic toolsetβ2,968Updated last month
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,585Updated 5 months ago
- IntelOwl: manage your Threat Intelligence at scaleβ4,273Updated this week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,192Updated 2 weeks ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationβ4,836Updated 8 months ago
- Incredibly fast crawler designed for OSINT.β11,815Updated 4 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β17,981Updated last week
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,368Updated 5 months ago
- An HTTP toolkit for security research.β8,116Updated 6 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β15,095Updated 8 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ12,800Updated 3 months ago
- Execute a local command using the processing power of another Linux machine.β3,135Updated 2 years ago
- A Workflow Engine for Offensive Securityβ5,841Updated last week
- A minimalist command line knowledge base managerβ3,260Updated 2 months ago
- πͺ Leak git repositories from misconfigured websitesβ1,583Updated 2 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with hβ¦β8,450Updated this week
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.β3,913Updated 5 months ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,137Updated 2 months ago
- The all-in-one browser extension for offensive security professionals πβ6,231Updated 7 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ6,981Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ4,218Updated this week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,691Updated 3 years ago
- Network Analysis Toolβ3,271Updated 2 years ago
- A temporary email right from your terminal written in POSIX shβ3,998Updated last year