k4m4 / hash-detector-cliLinks
Detect the possible hash-types corresponding to a string, right from your terminal.
☆11Updated 2 years ago
Alternatives and similar repositories for hash-detector-cli
Users that are interested in hash-detector-cli are comparing it to the libraries listed below
Sorting:
- Various exploits☆10Updated 8 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 2 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Software exploitation training material☆15Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- AES encrypted python backdoor that communicates AES encrypted data☆9Updated 10 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated 3 weeks ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 9 months ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Some good feeds for people who seriously want to keep up to date with InfoSec news and tech☆13Updated 7 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- pentest toolbox☆28Updated 3 years ago