k4m4 / hash-detector-cli
Detect the possible hash-types corresponding to a string, right from your terminal.
☆11Updated 2 years ago
Alternatives and similar repositories for hash-detector-cli:
Users that are interested in hash-detector-cli are comparing it to the libraries listed below
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Various exploits☆10Updated 7 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- A web app scanner☆26Updated 11 years ago
- Search bing with python☆12Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- All xxx-arsenal repos in one☆15Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- The LAZY script will make your life easier, and of course faster.☆9Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 2 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 10 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- async web crawler☆27Updated 10 years ago
- Collection of cracked malware☆14Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆18Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago