blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆611Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆515Updated last year
- Web Fuzzer☆415Updated last year
- CeWL is a Custom Word List Generator☆2,307Updated 9 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,385Updated this week
- Local file inclusion exploitation tool☆881Updated 2 years ago
- Username tools for penetration testing☆1,123Updated 10 months ago
- Automatic Enumeration Tool based in Open Source tools☆928Updated last year
- Hydra Password Cracking Cheetsheet☆404Updated 4 years ago
- Infosec Wordlists and more.☆868Updated last month
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,056Updated 3 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,135Updated 10 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,893Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,851Updated 3 years ago
- Some of the best web shells that you might need!☆340Updated 2 years ago
- Hash type identifier (CLI & lib)☆890Updated last week
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆228Updated 3 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,072Updated 2 years ago
- Steganography brute-force utility to uncover hidden data inside files☆574Updated 4 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,308Updated 3 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,276Updated 2 weeks ago
- One rule to crack all passwords. or atleast we hope so.☆1,553Updated 3 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆613Updated last week
- pwning IPv4 via IPv6☆1,821Updated last year
- Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications…☆1,344Updated 10 months ago
- Various webshells. We accept pull requests for additions to this collection.☆968Updated last year
- Hashcat Cheatsheet for OSCP☆617Updated 5 years ago
- ☆212Updated 5 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆557Updated 2 years ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,239Updated 3 months ago
- JSshell - JavaScript reverse/remote shell☆627Updated 2 years ago