noraj / haiti
Hash type identifier (CLI & lib)
☆866Updated last month
Alternatives and similar repositories for haiti:
Users that are interested in haiti are comparing it to the libraries listed below
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,317Updated last month
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆538Updated 3 years ago
- Penelope Shell Handler☆916Updated last month
- Collection of reverse shells for red team operations.☆492Updated last month
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,553Updated 2 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆622Updated 3 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,306Updated 2 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,195Updated last week
- ☆208Updated 4 years ago
- ☆1,105Updated 4 years ago
- An XSS exploitation command-line interface and payload generator.☆1,363Updated 3 months ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆290Updated 3 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆569Updated 6 months ago
- Real-world infosec wordlists, updated regularly☆1,495Updated this week
- Generates millions of keyword-based password mutations in seconds.☆1,300Updated 9 months ago
- Local file inclusion exploitation tool☆863Updated last year
- Sticky notes for pentesting, bug bounty, CTF.☆693Updated 3 weeks ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,161Updated 2 years ago
- Rockyou for web fuzzing☆2,789Updated last week
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,244Updated 2 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,886Updated 8 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,965Updated last week
- Identify privilege escalation paths within and across different clouds☆692Updated 3 weeks ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,145Updated 9 months ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,172Updated 9 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,439Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,268Updated 2 weeks ago
- A simple tool for bypassing file upload restrictions.☆843Updated 9 months ago
- bypass-url-parser☆1,069Updated this week
- CeWL is a Custom Word List Generator☆2,219Updated 6 months ago