k4m4 / hash-detector-cliLinks
Detect the possible hash-types corresponding to a string, right from your terminal.
☆11Updated 3 years ago
Alternatives and similar repositories for hash-detector-cli
Users that are interested in hash-detector-cli are comparing it to the libraries listed below
Sorting:
- All xxx-arsenal repos in one☆17Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 12 years ago
- Various exploits☆10Updated 8 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 2 weeks ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 8 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21Updated 8 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆31Updated 5 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Updated 6 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- pen testing scripts☆12Updated 4 years ago
- Software exploitation training material☆16Updated 8 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 8 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Updated last year
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Open-source Exploiting Framework☆31Updated 8 years ago
- Tools and scripts dedicated to Android application security☆52Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago