bee-san / pyWhatLinks
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
☆7,045Updated last year
Alternatives and similar repositories for pyWhat
Users that are interested in pyWhat are comparing it to the libraries listed below
Sorting:
- Scanning APK file for URIs, endpoints & secrets.☆5,437Updated 3 weeks ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,995Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,598Updated 6 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,181Updated 5 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆12,845Updated 3 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,380Updated 6 months ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,915Updated 6 months ago
- An HTTP toolkit for security research.☆8,170Updated 7 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,100Updated 4 months ago
- A fast, simple, recursive content discovery tool written in Rust.☆6,949Updated this week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,827Updated 3 months ago
- A Workflow Engine for Offensive Security☆5,874Updated last month
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,863Updated last year
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,138Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,144Updated 10 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,212Updated last month
- The all-in-one browser extension for offensive security professionals 🛠☆6,248Updated 8 months ago
- ⚠️ Browser fingerprinting via favicon!☆4,714Updated 2 years ago
- Extract files from any kind of container formats☆2,352Updated last week
- 🤖 The Modern Port Scanner 🤖☆17,960Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆15,278Updated 8 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,699Updated 3 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,146Updated 2 weeks ago
- Infection Monkey - An open-source adversary emulation platform☆6,859Updated 4 months ago
- 🔐 Share end-to-end encrypted secrets with others via a one-time URL☆1,829Updated 7 months ago
- Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.☆12,710Updated this week
- 🗄 Mount your browser tabs as a filesystem.☆3,905Updated 8 months ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆19,904Updated 6 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,190Updated 4 months ago
- Network Analysis Tool☆3,274Updated 2 years ago