blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆619Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆525Updated last year
- Some of the best web shells that you might need!☆346Updated 2 years ago
- Local file inclusion exploitation tool☆909Updated last month
- Infosec Wordlists and more.☆899Updated 5 months ago
- CeWL is a Custom Word List Generator☆2,459Updated last month
- Web Fuzzer☆427Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,468Updated last month
- Hash type identifier (CLI & lib)☆918Updated 2 months ago
- Username tools for penetration testing☆1,218Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,928Updated this week
- Hydra Password Cracking Cheetsheet☆411Updated 5 years ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆838Updated 3 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,339Updated 6 months ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,066Updated 3 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,892Updated 3 years ago
- JSshell - JavaScript reverse/remote shell☆626Updated 2 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,154Updated last year
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆417Updated 2 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆646Updated 3 months ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,273Updated last year
- One rule to crack all passwords. or atleast we hope so.☆1,579Updated 3 years ago
- Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications…☆1,387Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,900Updated 3 years ago
- Hashcat Cheatsheet for OSCP☆623Updated 5 years ago
- 🎯 RFI/LFI Payload List☆629Updated last year
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,248Updated 9 months ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,097Updated 3 years ago
- All MITM attacks in one place.☆1,004Updated 3 years ago
- CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.☆1,143Updated 3 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆645Updated 3 months ago