blackploit / hash-identifier
Software to identify the different types of hashes used to encrypt data and especially passwords
☆599Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆510Updated last year
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,323Updated last month
- CeWL is a Custom Word List Generator☆2,228Updated 6 months ago
- Hash type identifier (CLI & lib)☆867Updated last month
- Local file inclusion exploitation tool☆865Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,867Updated 2 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,046Updated 2 years ago
- Hydra Password Cracking Cheetsheet☆400Updated 4 years ago
- Username tools for penetration testing☆1,036Updated 7 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,272Updated 3 weeks ago
- Web Fuzzer☆400Updated last year
- Steganography brute-force utility to uncover hidden data inside files☆570Updated 4 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆538Updated 3 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆624Updated 3 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,208Updated 3 months ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆547Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,815Updated 3 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆934Updated this week
- pwning IPv4 via IPv6☆1,791Updated last year
- Automatic Enumeration Tool based in Open Source tools☆927Updated last year
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,232Updated last year
- Various webshells. We accept pull requests for additions to this collection.☆932Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,247Updated last week
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,119Updated 8 months ago
- dnsenum is a perl script that enumerates DNS information☆636Updated 5 years ago
- Some of the best web shells that you might need!☆335Updated last year
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆475Updated 4 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,653Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,710Updated 7 months ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,174Updated 10 months ago