blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆615Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆523Updated last year
- Web Fuzzer☆425Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,433Updated last week
- Local file inclusion exploitation tool☆902Updated 3 weeks ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,452Updated last month
- Hydra Password Cracking Cheetsheet☆410Updated 5 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,924Updated 2 years ago
- Username tools for penetration testing☆1,203Updated last year
- Hash type identifier (CLI & lib)☆913Updated 2 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,338Updated 6 months ago
- Some of the best web shells that you might need!☆346Updated 2 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆415Updated 2 years ago
- Infosec Wordlists and more.☆892Updated 4 months ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆837Updated 3 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,145Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,879Updated 3 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,244Updated 8 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,311Updated last week
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆637Updated 3 months ago
- Automatic Enumeration Tool based in Open Source tools☆969Updated last year
- Steganography brute-force utility to uncover hidden data inside files☆580Updated 4 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,576Updated 3 years ago
- pwning IPv4 via IPv6☆1,850Updated last year
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,067Updated 3 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆499Updated 5 years ago
- 🎯 RFI/LFI Payload List☆622Updated last year
- Hashcat Cheatsheet for OSCP☆624Updated 5 years ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,139Updated 2 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,067Updated last year
- All MITM attacks in one place.☆1,002Updated 3 years ago