k4m4 / hash-detectorLinks
Retrieve an array of possible hash types corresponding to a given string.
☆17Updated 2 years ago
Alternatives and similar repositories for hash-detector
Users that are interested in hash-detector are comparing it to the libraries listed below
Sorting:
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆55Updated last year
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 2 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- transparent TCP-to-proxy redirector☆16Updated 6 years ago
- Network white noise collector☆19Updated 9 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- A website outlining my bounty hunt game.☆11Updated 6 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Various exploits☆10Updated 8 years ago
- ☆12Updated 11 years ago
- Colloide is a bruteforcing tool to find hidden pages, files and directories inside websites☆34Updated 4 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Updated 10 years ago
- lulz: automated webstalking tool☆53Updated 9 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 5 months ago
- Vulnerability Scanner☆11Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 11 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- pen testing scripts☆12Updated 4 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆34Updated 4 years ago