noraj / haiti
Hash type identifier (CLI & lib)
☆767Updated last week
Related projects: ⓘ
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,102Updated last month
- Generates millions of keyword-based password mutations in seconds.☆1,060Updated last month
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆464Updated 2 years ago
- Penelope Shell Handler☆590Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,796Updated 2 months ago
- Real-world infosec wordlists, updated regularly☆1,350Updated this week
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,012Updated 5 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆592Updated this week
- Collection of reverse shells for red team operations.☆447Updated last month
- An XSS exploitation command-line interface and payload generator.☆1,233Updated last month
- Fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike.☆1,358Updated 2 weeks ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆615Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆954Updated 3 months ago
- ☆1,037Updated 3 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆541Updated last week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,460Updated 8 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,744Updated last month
- This project is aimed at freely providing technical guides on various hacking topics.☆704Updated this week
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,022Updated last month
- Powershell tool to automate Active Directory enumeration.☆981Updated last month
- Script for generating revshells☆451Updated last week
- A simple tool for bypassing file upload restrictions.☆755Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,344Updated last year
- bypass-url-parser☆996Updated this week
- Active Directory and Internal Pentest Cheatsheets☆869Updated this week
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,206Updated this week
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆791Updated 3 months ago
- ☆197Updated 4 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,721Updated 3 months ago
- Multi-threaded Python Port Scanner with Nmap Integration☆351Updated 2 years ago