noraj / haitiLinks
Hash type identifier (CLI & lib)
☆875Updated last month
Alternatives and similar repositories for haiti
Users that are interested in haiti are comparing it to the libraries listed below
Sorting:
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,332Updated last month
- Collection of reverse shells for red team operations.☆497Updated 2 months ago
- ☆1,110Updated 4 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆610Updated 6 months ago
- Penelope Shell Handler☆940Updated 2 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆624Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆539Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,150Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,968Updated 2 weeks ago
- An XSS exploitation command-line interface and payload generator.☆1,375Updated 4 months ago
- Real-world infosec wordlists, updated regularly☆1,510Updated this week
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,160Updated 9 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,285Updated last month
- A tool to perform Kerberos pre-auth bruteforcing☆2,925Updated 9 months ago
- WhiteWinterWolf's PHP web shell☆663Updated 7 years ago
- Local file inclusion exploitation tool☆865Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,403Updated 2 weeks ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,977Updated 2 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,509Updated last week
- Hardware/IOT Pentesting Wiki☆638Updated 3 weeks ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,205Updated last month
- ☆211Updated 4 years ago
- CeWL is a Custom Word List Generator☆2,239Updated 7 months ago
- An IIS short filename enumeration tool☆940Updated 6 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,563Updated 3 months ago
- Pentester's Promiscuous Notebook☆493Updated last week
- Abusing impersonation privileges through the "Printer Bug"☆2,006Updated 4 years ago
- A simple tool for bypassing file upload restrictions.☆853Updated 10 months ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆1,873Updated last year
- Sticky notes for pentesting, bug bounty, CTF.☆699Updated last month