πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! π§ββοΈ
β7,212Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for pyWhat
Users that are interested in pyWhat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,362Updated this week
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,405Mar 5, 2025Updated last year
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,647Dec 19, 2025Updated 4 months ago
- Rich is a Python library for rich text and beautiful formatting in the terminal.β56,199Apr 12, 2026Updated 2 weeks ago
- π΅οΈββοΈ Offensive Google framework.β18,763Apr 10, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,128Mar 12, 2024Updated 2 years ago
- π€ The Modern Port Scanner π€β19,683Apr 21, 2026Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,498Apr 12, 2026Updated 2 weeks ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.β17,997Sep 10, 2025Updated 7 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ77,264Apr 22, 2026Updated last week
- Turn (almost) any Python command line program into a full GUI application with one lineβ21,910Mar 23, 2026Updated last month
- Hunt down social media accounts by username across social networksβ82,092Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,594Apr 13, 2026Updated 2 weeks ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β19,113Apr 18, 2026Updated last week
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Execute a local command using the processing power of another Linux machine.β3,136Jan 24, 2023Updated 3 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,524Updated this week
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β53,332Updated this week
- The lean application framework for Python. Build sophisticated user interfaces with a simple Python API. Run your apps in the terminal aβ¦β35,587Updated this week
- Scanning APK file for URIs, endpoints & secrets.β6,048Aug 20, 2025Updated 8 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,705Jan 12, 2026Updated 3 months ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β4,521Apr 14, 2026Updated 2 weeks ago
- Attack Surface Management Platformβ9,715Feb 15, 2026Updated 2 months ago
- A collection of modern/faster/saner alternatives to common unix commands.β32,898Sep 10, 2024Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,481Apr 23, 2026Updated last week
- A Modern Orchestration Engine for Securityβ6,211Apr 15, 2026Updated 2 weeks ago
- Find, verify, and analyze leaked credentialsβ25,895Apr 23, 2026Updated last week
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,655Jun 20, 2024Updated last year
- The all-in-one browser extension for offensive security professionals πβ6,698Jan 5, 2025Updated last year
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,661Updated this week
- Reverse Engineer's Toolkitβ5,189May 1, 2025Updated last year
- IntelOwl: manage your Threat Intelligence at scaleβ4,560Updated this week
- π΅οΈββοΈ Collect a dossier on a person by username from 3000+ sitesβ19,604Apr 24, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β28,094Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,567Mar 21, 2026Updated last month
- In-depth attack surface mapping and asset discoveryβ14,463Apr 17, 2026Updated 2 weeks ago
- An open-source digital image forensic toolsetβ3,132Apr 17, 2026Updated 2 weeks ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β11,234Updated this week
- Incredibly fast crawler designed for OSINT.β12,832Feb 10, 2026Updated 2 months ago
- Infection Monkey - An open-source adversary emulation platformβ6,995May 1, 2025Updated last year