moloch-- / hashlookupLinks
A Python implementation of Crackstion's Hash Lookup
☆26Updated 5 years ago
Alternatives and similar repositories for hashlookup
Users that are interested in hashlookup are comparing it to the libraries listed below
Sorting:
- ☆102Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 5 years ago
- ☆84Updated 10 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- A shellcode testing harness.☆70Updated last year
- Simple DDE object detector☆56Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Tinkering with bits and bytes☆11Updated last year
- Babel Scripting Framework☆43Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- simple shellcode generator☆114Updated 8 years ago
- Published vulnerabilities and exploits.☆57Updated 2 years ago
- unix wildcard attacks☆136Updated 7 years ago
- CANAPE Network Testing Tool☆33Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Development guide for Volatility Plugins☆22Updated 8 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- ☆106Updated 4 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆64Updated 9 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Network based protocol fuzzer☆75Updated 3 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- SMTP server / sinkhole for collecting spam☆45Updated 7 years ago
- Exfiltrate data with ICMP☆101Updated 7 years ago