blackploit / hash-identifierLinks
Software to identify the different types of hashes used to encrypt data and especially passwords
☆607Updated last year
Alternatives and similar repositories for hash-identifier
Users that are interested in hash-identifier are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆514Updated last year
- Automatic Enumeration Tool based in Open Source tools☆930Updated last year
- CeWL is a Custom Word List Generator☆2,262Updated 7 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,260Updated last week
- Local file inclusion exploitation tool☆870Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,879Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,345Updated 2 months ago
- Username tools for penetration testing☆1,074Updated 9 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆625Updated 3 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,297Updated 2 months ago
- Some of the best web shells that you might need!☆338Updated last year
- Hash type identifier (CLI & lib)☆878Updated 2 weeks ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,829Updated 3 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,129Updated 9 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,539Updated 3 years ago
- SMBMap is a handy SMB enumeration tool☆1,921Updated 3 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,219Updated last month
- Infosec Wordlists and more.☆844Updated this week
- pwning IPv4 via IPv6☆1,807Updated last year
- CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.☆1,107Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆968Updated last week
- Collection of reverse shells for red team operations.☆499Updated 3 months ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,049Updated 3 years ago
- Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications…☆1,324Updated 9 months ago
- Hydra Password Cracking Cheetsheet☆401Updated 4 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,215Updated 4 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,628Updated 6 months ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,273Updated last year
- DotDotPwn - The Directory Traversal Fuzzer☆1,061Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆549Updated 3 years ago