k4m4 / hash-detectorLinks
Retrieve an array of possible hash types corresponding to a given string.
☆17Updated 2 years ago
Alternatives and similar repositories for hash-detector
Users that are interested in hash-detector are comparing it to the libraries listed below
Sorting:
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 2 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Quick utility to craft executables for pentesting and managing reverse shells☆43Updated 6 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated last month
- All xxx-arsenal repos in one☆16Updated 6 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆124Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Network white noise collector☆19Updated 9 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- social media intelligence from the command line☆44Updated 5 months ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆76Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆56Updated 7 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 11 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago
- A first look at browser-based Cryptojacking☆17Updated 7 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆16Updated 5 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago