Hash type identifier (CLI & lib)
☆965Apr 22, 2026Updated last week
Alternatives and similar repositories for haiti
Users that are interested in haiti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,647Dec 19, 2025Updated 4 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆532Apr 17, 2024Updated 2 years ago
- Monitor linux processes without root permissions☆5,983Mar 1, 2026Updated last month
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,893Dec 25, 2023Updated 2 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,717Nov 29, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,161Apr 22, 2026Updated last week
- Fancy reverse and bind shell handler☆2,885Aug 9, 2024Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆3,306Aug 20, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Apr 22, 2026Updated last week
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,438Feb 24, 2023Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,172Mar 8, 2026Updated last month
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,579Feb 20, 2026Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,671Updated this week
- Trying to tame the three-headed dog.☆4,980Nov 14, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆91Apr 22, 2026Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,433Jan 26, 2026Updated 3 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,358Mar 10, 2026Updated last month
- Username tools for penetration testing☆1,374Sep 20, 2024Updated last year
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,802Feb 27, 2026Updated 2 months ago
- The Network Execution Tool☆5,469Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆3,485Feb 28, 2026Updated 2 months ago
- A Python based ingestor for BloodHound☆2,380Oct 24, 2025Updated 6 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,389Apr 23, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,385Sep 22, 2025Updated 7 months ago
- A CLI tool to identify the hash type of a given hash.☆114Aug 26, 2022Updated 3 years ago
- game of active directory☆7,753Mar 12, 2026Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,504Feb 15, 2026Updated 2 months ago
- Privilege Escalation Enumeration Script for Windows☆3,819Apr 16, 2026Updated 2 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,498Apr 12, 2026Updated 2 weeks ago
- Abusing impersonation privileges through the "Printer Bug"☆2,233Sep 10, 2020Updated 5 years ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,701Apr 15, 2026Updated 2 weeks ago
- A swiss army knife for pentesting networks☆9,129Dec 6, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Various *nix tools built as statically-linked binaries☆3,673Aug 21, 2023Updated 2 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,974Apr 14, 2026Updated 2 weeks ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆756Dec 8, 2025Updated 4 months ago
- Adversary Emulation Framework☆11,081Apr 22, 2026Updated last week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,905Sep 6, 2023Updated 2 years ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,028Apr 17, 2026Updated last week
- Starkiller is a Frontend for PowerShell Empire.☆1,650Apr 5, 2026Updated 3 weeks ago