The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or private keys. Thereby, SFH is able to enumerate FTP, NFS, or SMB services as well as local filesystems.
☆14Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for SmartFileHunter
Users that are interested in SmartFileHunter are comparing it to the libraries listed below
Sorting:
- Telegram Remote Administration Tool☆25Sep 24, 2024Updated last year
- Creates and sends fake meeting invite☆74Apr 24, 2021Updated 4 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- Face Recognition & FindClone☆12Nov 16, 2020Updated 5 years ago
- ☆10Updated this week
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 8 months ago
- A Bitcoin Blockchain explorer for the terminal☆13Jan 24, 2016Updated 10 years ago
- Matrisea is a web-based Android reversing platform that provides high-fidelity virtual devices with powerful integrated tools☆10Mar 1, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Mozilla list of RPs and Groups for SSO-Dashboard☆12Feb 17, 2026Updated last week
- Peer-to-peer Bitcoin mining pool☆10Jul 14, 2016Updated 9 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- linux bluetoothctl wrapper (also works with arm devices like raspberry pi). Modified version of http://bitbucket.com/serkanp/bluetoothctl☆10Nov 22, 2019Updated 6 years ago
- Python program to download pictures from multiple imageboard threads like 4chan, 420chan or 7chan.☆16Nov 8, 2014Updated 11 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- ☆40Jun 5, 2021Updated 4 years ago
- The Good, the Bad and the Ugly: результаты частичного аудита кода Nesca☆13Jan 16, 2019Updated 7 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Quarkus Mutual TLS Quickstart☆12Mar 28, 2025Updated 11 months ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Building Reactive play application with Anorm☆15Feb 8, 2015Updated 11 years ago
- Simple Tahoe LAFS storage node☆12Jul 11, 2015Updated 10 years ago
- ☆10May 29, 2023Updated 2 years ago
- koyu.space Android app (native)☆12Oct 29, 2021Updated 4 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- Java Library for Developing Microsoft Outlook Add-ins☆13Apr 24, 2022Updated 3 years ago
- FSB Vorbis Extractor☆12Aug 26, 2023Updated 2 years ago
- Skycoin exchange service☆15Dec 30, 2022Updated 3 years ago
- Examples for using Xepor framework☆11Jul 4, 2023Updated 2 years ago