hrbrmstr / go-hhhashLinks
#οΈβ£ πΈοΈ π€ HTTP Headers Hashing
β13Updated last year
Alternatives and similar repositories for go-hhhash
Users that are interested in go-hhhash are comparing it to the libraries listed below
Sorting:
- Exactly what it sounds like, which is something radβ22Updated 2 years ago
- Monitor malware scanning services for your payloadsβ11Updated 3 years ago
- Rosie the Pivoterβ17Updated 6 years ago
- SSDP Service Discoveryβ17Updated 6 years ago
- Do the unexpected with AD GPO processingβ9Updated 6 years ago
- Network Finger Printerβ16Updated 7 years ago
- Kibana app for RedELKβ17Updated 2 years ago
- Apfell implant written in C#.β8Updated 4 years ago
- Hacky linux memory probe. Yara or Regex scan process memoryβ11Updated 2 weeks ago
- 3gsocks - a reverse connection socks5 based network pivotβ10Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing supportβ22Updated 3 years ago
- Tricard - Malware Sandbox Fingerprintingβ20Updated last year
- Experimenting with destructive file attacks in Goβ18Updated 6 years ago
- Configurable, Community driven, HTTP C2 Profileβ22Updated 2 weeks ago
- Exploit for win10 SMB3.1β17Updated 5 years ago
- parsers to make life easierβ13Updated 4 years ago
- A Canary which fires when uninstalledβ34Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research teaβ¦β18Updated 3 years ago
- Automated tool for setting up KingPhisherβ9Updated 4 years ago
- Golang Shlyuz Implant Implementationβ13Updated 3 weeks ago
- Automated Persistence and Lateral Movement using GCP Patch Managementβ15Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.β13Updated 6 months ago
- Keyhack - Golang API token/webhook validatorβ16Updated 2 months ago
- Standardizing Security Titlesβ13Updated 2 years ago
- β15Updated 4 years ago
- ADD/SUB encoder for alphanumeric shellcodeβ9Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated 6 months ago
- β16Updated last month
- Modular C2 server to tame your pack of wolvesβ12Updated last month
- β11Updated 4 years ago