blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆608Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆514Updated last year
- Web Fuzzer☆414Updated last year
- Infosec Wordlists and more.☆856Updated 3 weeks ago
- CeWL is a Custom Word List Generator☆2,287Updated 8 months ago
- Local file inclusion exploitation tool☆875Updated last year
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,356Updated 3 months ago
- Some of the best web shells that you might need!☆339Updated 2 years ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,052Updated 3 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,130Updated 10 months ago
- Hash type identifier (CLI & lib)☆884Updated last month
- Hydra Password Cracking Cheetsheet☆403Updated 4 years ago
- Username tools for penetration testing☆1,103Updated 9 months ago
- Automatic Enumeration Tool based in Open Source tools☆929Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,884Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,302Updated 2 months ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,064Updated 2 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,216Updated 5 months ago
- 🎯 RFI/LFI Payload List☆602Updated 11 months ago
- Steganography brute-force utility to uncover hidden data inside files☆572Updated 4 years ago
- Hashcat Cheatsheet for OSCP☆618Updated 5 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆609Updated 2 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆401Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,382Updated 5 months ago
- ☆649Updated last year
- One rule to crack all passwords. or atleast we hope so.☆1,547Updated 3 years ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,186Updated 11 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,834Updated 3 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,267Updated 3 weeks ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆835Updated 3 years ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,133Updated 2 years ago