bee-san / pyWhat
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
☆6,757Updated last year
Alternatives and similar repositories for pyWhat:
Users that are interested in pyWhat are comparing it to the libraries listed below
- An HTTP toolkit for security research.☆6,174Updated this week
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆18,507Updated 9 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,788Updated 10 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,308Updated last year
- Execute a local command using the processing power of another Linux machine.☆3,126Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆3,935Updated this week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,516Updated last year
- 🔪 Leak git repositories from misconfigured websites☆1,556Updated 2 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,141Updated last month
- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️☆5,836Updated 3 weeks ago
- Scanning APK file for URIs, endpoints & secrets.☆5,057Updated 2 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆13,507Updated last month
- Archivy is a self-hostable knowledge repository that allows you to learn and retain information in your own personal and extensible wiki.☆3,223Updated last year
- 🕵️♂️ Offensive Google framework.☆15,980Updated last week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,052Updated 2 months ago
- Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.☆10,898Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,041Updated last week
- Web Attack Cheat Sheet☆4,222Updated last week
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,567Updated 3 weeks ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆10,651Updated this week
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆1,947Updated 6 months ago
- Reverse Engineer's Toolkit☆4,869Updated 9 months ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆3,913Updated 2 weeks ago
- 🔐 Share end-to-end encrypted secrets with others via a one-time URL☆1,781Updated last year
- A DFIR tool written in Python.☆1,044Updated 3 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,120Updated last month
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆7,649Updated 2 months ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13,873Updated last week