blackploit / hash-identifier
Software to identify the different types of hashes used to encrypt data and especially passwords
☆560Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for hash-identifier
- Fetch, install and search wordlist archives from websites and torrent peers.☆495Updated 7 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,192Updated 3 months ago
- CeWL is a Custom Word List Generator☆2,001Updated 3 weeks ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,530Updated last year
- Local file inclusion exploitation tool☆793Updated last year
- Hash type identifier (CLI & lib)☆802Updated 2 weeks ago
- pwning IPv4 via IPv6☆1,714Updated 9 months ago
- Username tools for penetration testing☆853Updated 2 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,678Updated last month
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,080Updated last year
- Infosec Wordlists and more.☆771Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,813Updated last year
- Collection of reverse shells for red team operations.☆466Updated last month
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,699Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,486Updated 10 months ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆560Updated last year
- Hydra Password Cracking Cheetsheet☆386Updated 4 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,476Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,045Updated last week
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,010Updated 2 years ago
- 🔎 shodansploit > v1.3.0☆525Updated last year
- All In One Web Recon☆2,295Updated 2 weeks ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆613Updated 3 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,185Updated last month
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆807Updated 2 years ago
- Reverse shell generator written in Python 3.☆513Updated 10 months ago
- Some of the best web shells that you might need!☆324Updated last year
- Automatic Enumeration Tool based in Open Source tools☆878Updated last year
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,109Updated 3 weeks ago
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,187Updated last month