bee-san / pyWhatLinks
πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! π§ββοΈ
β7,082Updated 2 years ago
Alternatives and similar repositories for pyWhat
Users that are interested in pyWhat are comparing it to the libraries listed below
Sorting:
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,286Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,024Updated last year
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,605Updated 8 months ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β20,160Updated 8 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,200Updated 5 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β15,811Updated 10 months ago
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,386Updated 8 months ago
- Scanning APK file for URIs, endpoints & secrets.β5,702Updated 2 months ago
- π΅οΈββοΈ Offensive Google framework.β18,086Updated last month
- Reverse Engineer's Toolkitβ5,111Updated 6 months ago
- An open-source digital image forensic toolsetβ3,035Updated 3 months ago
- Infection Monkey - An open-source adversary emulation platformβ6,887Updated 6 months ago
- IntelOwl: manage your Threat Intelligence at scaleβ4,345Updated this week
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ18,069Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β10,503Updated this week
- An HTTP toolkit for security research.β8,984Updated 9 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β9,703Updated last week
- Network Analysis Toolβ3,297Updated 2 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β18,331Updated 2 weeks ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ33,051Updated 3 months ago
- Execute a local command using the processing power of another Linux machine.β3,136Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,491Updated last year
- π€ The Modern Port Scanner π€β18,428Updated this week
- Open Cyber Threat Intelligence Platformβ7,922Updated this week
- a drop-in replacement for Nmap powered by shodan.ioβ3,125Updated 6 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.β5,642Updated this week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,715Updated 4 years ago
- Never ever ever use pixelation as a redaction techniqueβ8,156Updated last year
- The all-in-one browser extension for offensive security professionals πβ6,310Updated 10 months ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributionsβ2,228Updated 3 weeks ago