blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆626Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆531Updated last year
- CeWL is a Custom Word List Generator☆2,549Updated 3 months ago
- Web Fuzzer☆429Updated 2 years ago
- Local file inclusion exploitation tool☆917Updated 3 months ago
- Infosec Wordlists and more.☆916Updated 7 months ago
- Hydra Password Cracking Cheetsheet☆414Updated 5 years ago
- Hash type identifier (CLI & lib)☆935Updated this week
- Some of the best web shells that you might need!☆348Updated 2 years ago
- Automatic Enumeration Tool based in Open Source tools☆1,000Updated 2 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,103Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,516Updated last month
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆242Updated 3 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,157Updated last year
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆418Updated 2 years ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,316Updated last month
- Username tools for penetration testing☆1,294Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,354Updated last week
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,076Updated 3 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,941Updated 2 months ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,272Updated 11 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,364Updated 9 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,626Updated last month
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,903Updated 3 years ago
- ☆695Updated last year
- Hashcat Cheatsheet for OSCP☆624Updated 5 years ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,149Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,591Updated 4 years ago
- pwning IPv4 via IPv6☆1,874Updated last year
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆836Updated 3 years ago
- CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.☆1,161Updated 4 years ago