k4m4 / hash-detector
Retrieve an array of possible hash types corresponding to a given string.
☆18Updated 2 years ago
Alternatives and similar repositories for hash-detector:
Users that are interested in hash-detector are comparing it to the libraries listed below
- Detect the possible hash-types corresponding to a string, right from your terminal.☆12Updated 2 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated 8 months ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Network white noise collector☆18Updated 8 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Google dorks generator to find open shells (on government sites)☆29Updated 10 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆13Updated 2 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆33Updated 13 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Detect whether an IP address belongs to a Tor exit node.☆24Updated 2 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- This is a source mirror for 0trace.☆12Updated 10 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Updated 5 years ago
- ☆14Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year