🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
☆7,217Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for pyWhat
Users that are interested in pyWhat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,399Updated this week
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,401Mar 5, 2025Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,653Dec 19, 2025Updated 5 months ago
- Rich is a Python library for rich text and beautiful formatting in the terminal.☆56,360Apr 12, 2026Updated last month
- 🕵️♂️ Offensive Google framework.☆18,947Apr 10, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,133Mar 12, 2024Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19,793Apr 30, 2026Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,540Apr 12, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,765Apr 22, 2026Updated 3 weeks ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆18,233Sep 10, 2025Updated 8 months ago
- Turn (almost) any Python command line program into a full GUI application with one line☆21,893Mar 23, 2026Updated last month
- Hunt down social media accounts by username across social networks☆83,419Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,848Apr 13, 2026Updated last month
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,215May 11, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Execute a local command using the processing power of another Linux machine.☆3,134Jan 24, 2023Updated 3 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,575May 11, 2026Updated last week
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,605Updated this week
- The lean application framework for Python. Build sophisticated user interfaces with a simple Python API. Run your apps in the terminal a…☆35,933Updated this week
- Scanning APK file for URIs, endpoints & secrets.☆6,071Aug 20, 2025Updated 9 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆22,843Jan 12, 2026Updated 4 months ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆4,535Apr 14, 2026Updated last month
- Attack Surface Management Platform☆10,016Apr 29, 2026Updated 3 weeks ago
- A collection of modern/faster/saner alternatives to common unix commands.☆32,915Sep 10, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,561Updated this week
- Find, verify, and analyze leaked credentials☆26,288Updated this week
- A Modern Orchestration Engine for Security☆6,327May 11, 2026Updated last week
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,672Jun 20, 2024Updated last year
- The all-in-one browser extension for offensive security professionals 🛠☆6,717Jan 5, 2025Updated last year
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,847May 15, 2026Updated last week
- IntelOwl: manage your Threat Intelligence at scale☆4,578Updated this week
- Reverse Engineer's Toolkit☆5,199Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,713Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,652Mar 21, 2026Updated 2 months ago
- In-depth attack surface mapping and asset discovery☆14,563Apr 17, 2026Updated last month
- An open-source digital image forensic toolset☆3,142May 12, 2026Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,309Updated this week
- 🕵️♂️ Collect a dossier on a person by username from 3000+ sites☆28,870Updated this week
- Incredibly fast crawler designed for OSINT.☆12,881Feb 10, 2026Updated 3 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,999May 1, 2025Updated last year