k4m4 / hash-detectorLinks
Retrieve an array of possible hash types corresponding to a given string.
☆17Updated 3 years ago
Alternatives and similar repositories for hash-detector
Users that are interested in hash-detector are comparing it to the libraries listed below
Sorting:
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 3 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Updated 6 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆78Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 12 years ago
- Colloide is a bruteforcing tool to find hidden pages, files and directories inside websites☆34Updated 4 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Updated last year
- A badass grabbing tool for getting PDF's of books.☆26Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated last month
- Fast browser-based network discovery module☆115Updated 4 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Updated 6 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 3 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Identify connection of sessions for social engineering attacks.☆58Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Updated 6 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71Updated 6 years ago
- A website outlining my bounty hunt game.☆11Updated 6 years ago
- scripts to setup pentesting system and use during pentest☆19Updated 3 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Updated 11 years ago
- Use Tor for anonymous scanning with nmap☆91Updated 10 years ago
- All xxx-arsenal repos in one☆17Updated 7 years ago
- lulz: automated webstalking tool☆54Updated 9 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 5 years ago