frdmn / findmyhash
Python script to crack hashes using online services
☆89Updated 3 years ago
Alternatives and similar repositories for findmyhash:
Users that are interested in findmyhash are comparing it to the libraries listed below
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆134Updated 4 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- Python based script for Information Gathering.☆106Updated 9 months ago
- wifi attacks suite☆59Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆205Updated 5 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆93Updated last year
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆107Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆275Updated 9 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆145Updated 6 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆33Updated 7 years ago
- ☆60Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆137Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Reverse Shell Using JavaScript & XSS☆35Updated 6 years ago
- search for hosts info with shodan☆231Updated 3 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆261Updated 7 years ago
- A unified console to perform the "kill chain" stages of attacks.☆204Updated last year
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- ☆180Updated last year
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Updated 4 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 6 years ago
- Collection My Wordlist☆122Updated 8 years ago
- HashCobra Hash Cracking tool.☆122Updated 4 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆73Updated 3 months ago
- Automated Tools Pentest☆7Updated last year
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago