blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆609Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆517Updated last year
- Web Fuzzer☆418Updated last year
- Hydra Password Cracking Cheetsheet☆406Updated 4 years ago
- CeWL is a Custom Word List Generator☆2,335Updated 10 months ago
- Local file inclusion exploitation tool☆884Updated 2 years ago
- Some of the best web shells that you might need!☆345Updated 2 years ago
- Infosec Wordlists and more.☆876Updated 2 months ago
- Hash type identifier (CLI & lib)☆894Updated this week
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆404Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,315Updated 4 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,411Updated 3 weeks ago
- 🎯 RFI/LFI Payload List☆611Updated last year
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,139Updated 11 months ago
- Username tools for penetration testing☆1,143Updated 11 months ago
- Collection of reverse shells for red team operations.☆511Updated 5 months ago
- ☆214Updated 5 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆621Updated last month
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆494Updated 5 years ago
- Hashcat Cheatsheet for OSCP☆619Updated 5 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆628Updated 3 weeks ago
- Reverse shell generator written in Python 3.☆531Updated 3 weeks ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,231Updated 6 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆581Updated 3 years ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆229Updated 3 years ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,196Updated last year
- Steganography brute-force utility to uncover hidden data inside files☆577Updated 4 years ago
- ☆663Updated last year
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆836Updated 3 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,081Updated 2 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆197Updated last year