SQL injection via bruteforced MD5 hash reflection of random strings
☆53Feb 11, 2019Updated 7 years ago
Alternatives and similar repositories for hasherbasher
Users that are interested in hasherbasher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A Go parser for the /etc/passwd file☆21Feb 14, 2024Updated 2 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Code generator for binary parsing☆20Feb 1, 2020Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆34Jul 23, 2018Updated 7 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- ☆16May 6, 2015Updated 10 years ago
- Notes from Gophercon☆11Jul 10, 2024Updated last year
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 4 months ago
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Dump paths & pages from Next.js Manifest☆15Mar 19, 2024Updated 2 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- Generates several metasploit payloads☆15Apr 13, 2018Updated 7 years ago
- fast, zero config web endpoint change monitor☆43Aug 4, 2020Updated 5 years ago
- Automated 802.1x Bypass☆88Mar 11, 2020Updated 6 years ago