blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆615Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆520Updated last year
- CeWL is a Custom Word List Generator☆2,395Updated 11 months ago
- Web Fuzzer☆426Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,335Updated 5 months ago
- Automatic Enumeration Tool based in Open Source tools☆964Updated last year
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,438Updated 2 weeks ago
- Local file inclusion exploitation tool☆894Updated last week
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,917Updated 2 years ago
- Infosec Wordlists and more.☆889Updated 3 months ago
- Hash type identifier (CLI & lib)☆909Updated last month
- Some of the best web shells that you might need!☆344Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,569Updated 3 years ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,065Updated 3 years ago
- Hydra Password Cracking Cheetsheet☆410Updated 5 years ago
- pwning IPv4 via IPv6☆1,846Updated last year
- Hashcat Cheatsheet for OSCP☆622Updated 5 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,142Updated last year
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆411Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,870Updated 3 years ago
- Username tools for penetration testing☆1,191Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,893Updated 3 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆637Updated 2 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,302Updated 3 weeks ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆511Updated 2 years ago
- Some notes about Hydra for bruteforcing☆185Updated 5 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,465Updated last year
- Collection of reverse shells for red team operations.☆517Updated 6 months ago
- Various webshells. We accept pull requests for additions to this collection.☆979Updated 2 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,243Updated 8 months ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆562Updated 3 years ago