blackploit / hash-identifier
Software to identify the different types of hashes used to encrypt data and especially passwords
☆558Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for hash-identifier
- Fetch, install and search wordlist archives from websites and torrent peers.☆495Updated 6 months ago
- Local file inclusion exploitation tool☆787Updated last year
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,187Updated 3 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,522Updated last year
- Web Fuzzer☆357Updated last year
- CeWL is a Custom Word List Generator☆1,988Updated last week
- Automatic Enumeration Tool based in Open Source tools☆876Updated 11 months ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,091Updated 3 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,036Updated this week
- 🎯 RFI/LFI Payload List☆536Updated 3 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,074Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,696Updated 2 years ago
- Mass scan IPs for vulnerable services☆1,024Updated 2 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,107Updated 2 weeks ago
- Hash type identifier (CLI & lib)☆799Updated this week
- Some of the best web shells that you might need!☆321Updated last year
- Username tools for penetration testing☆841Updated last month
- PwnXSS: Vulnerability (XSS) scanner exploit☆745Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,679Updated 6 months ago
- Making Favicon.ico based Recon Great again !☆1,123Updated last year
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,034Updated 6 months ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,102Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,474Updated 10 months ago
- Steganography brute-force utility to uncover hidden data inside files☆551Updated 3 years ago
- Hydra Password Cracking Cheetsheet☆383Updated 4 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,075Updated last month
- Reverse shell generator written in Python 3.☆512Updated 10 months ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆2,017Updated 5 months ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,029Updated 5 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆476Updated 3 years ago