k4m4 / hash-detector-cliLinks
Detect the possible hash-types corresponding to a string, right from your terminal.
☆11Updated 2 years ago
Alternatives and similar repositories for hash-detector-cli
Users that are interested in hash-detector-cli are comparing it to the libraries listed below
Sorting:
- Various exploits☆10Updated 8 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 7 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 5 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- pen testing scripts☆12Updated 4 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated last year
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Search bing with python☆12Updated 11 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- A simple python scanner to detect vulnerable hosts in your net☆22Updated 8 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 2 years ago
- Manage the metasploit framework database☆16Updated 5 years ago
- Software exploitation training material☆16Updated 8 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- Get clients and access points.☆49Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 7 years ago