k4m4 / hash-detectorLinks
Retrieve an array of possible hash types corresponding to a given string.
☆17Updated 2 years ago
Alternatives and similar repositories for hash-detector
Users that are interested in hash-detector are comparing it to the libraries listed below
Sorting:
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- A website outlining my bounty hunt game.☆11Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 3 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 7 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 2 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 8 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 12 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆25Updated 3 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 7 years ago
- Network white noise collector☆19Updated 9 years ago
- Locky generates "really" strong yet easy to remember passwords.☆72Updated 6 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 11 years ago
- Massive arsenal of hacker tools...☆80Updated 8 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆55Updated last year
- Code, data, and (possibly) schematics for recording wireless network data around a city☆12Updated 12 years ago
- an evil chrome extension that steals credentials from form inputs☆26Updated 5 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- Hex encode & decode a string, right from your terminal.☆11Updated 2 years ago
- social media intelligence from the command line☆44Updated last week
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- python tools to assist in penetration testing☆15Updated 4 months ago