k4m4 / hash-detectorLinks
Retrieve an array of possible hash types corresponding to a given string.
☆17Updated 2 years ago
Alternatives and similar repositories for hash-detector
Users that are interested in hash-detector are comparing it to the libraries listed below
Sorting:
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- Detect whether a site is running behind Cloudflare.☆23Updated 11 months ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 2 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Hex encode & decode a string, right from your terminal.☆11Updated 2 years ago
- A web app scanner☆26Updated 11 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 4 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆25Updated 2 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- ARP ping detector on local network☆15Updated 12 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Thought experiment / prototype that performs random Google searches, clicks to increase privacy☆96Updated 8 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆15Updated 4 years ago
- Network white noise collector☆19Updated 9 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Find all cool documents on GOV and Info sites☆18Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- an evil chrome extension that steals credentials from form inputs☆26Updated 4 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago