bee-san / pyWhatLinks
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
☆6,953Updated last year
Alternatives and similar repositories for pyWhat
Users that are interested in pyWhat are comparing it to the libraries listed below
Sorting:
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,961Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,579Updated 4 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,367Updated 4 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,379Updated 4 months ago
- An HTTP toolkit for security research.☆7,269Updated 5 months ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆19,716Updated 4 months ago
- Execute a local command using the processing power of another Linux machine.☆3,135Updated 2 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,168Updated 5 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆12,626Updated 2 months ago
- A minimalist command line knowledge base manager☆3,258Updated last month
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,113Updated last year
- Network Analysis Tool☆3,264Updated 2 years ago
- IntelOwl: manage your Threat Intelligence at scale☆4,216Updated this week
- A temporary email right from your terminal written in POSIX sh☆3,989Updated 11 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,163Updated 2 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,069Updated 3 months ago
- 🗄 Mount your browser tabs as a filesystem.☆3,891Updated 7 months ago
- 🔪 Leak git repositories from misconfigured websites☆1,579Updated 2 years ago
- 🔐 Share end-to-end encrypted secrets with others via a one-time URL☆1,805Updated 5 months ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,598Updated 6 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,683Updated 3 years ago
- 🕵️♂️ Offensive Google framework.☆16,704Updated last month
- Infection Monkey - An open-source adversary emulation platform☆6,839Updated 3 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,729Updated last year
- a delightful machine learning tool that allows you to train, test, and use models without writing code☆3,124Updated 2 years ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,885Updated 3 weeks ago
- Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.☆12,359Updated this week
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,469Updated this week
- A pretty sweet vulnerability scanner☆4,140Updated 10 months ago
- A temporary SMS utility right from your terminal written in POSIX sh☆1,059Updated last year