noraj / haiti
Hash type identifier (CLI & lib)
☆858Updated last week
Alternatives and similar repositories for haiti:
Users that are interested in haiti are comparing it to the libraries listed below
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,298Updated last week
- Collection of reverse shells for red team operations.☆488Updated last month
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆563Updated 5 months ago
- Penelope Shell Handler☆894Updated last month
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆524Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi …☆1,544Updated last month
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,300Updated 2 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆621Updated 3 years ago
- ☆1,101Updated 3 years ago
- ☆208Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,117Updated 10 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,387Updated last week
- Real-world infosec wordlists, updated regularly☆1,482Updated this week
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,135Updated 8 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆682Updated 2 weeks ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆288Updated 3 years ago
- A small reverse shell for Linux & Windows☆598Updated 10 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,123Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,949Updated this week
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,520Updated 10 months ago
- ☆800Updated 2 years ago
- Local file inclusion exploitation tool☆857Updated last year
- PHP shells that work on Linux OS, macOS, and Windows OS.☆480Updated last year
- Username tools for penetration testing☆997Updated 7 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,435Updated 2 years ago
- Script for generating revshells☆468Updated 7 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,368Updated 3 weeks ago
- Generates millions of keyword-based password mutations in seconds.☆1,285Updated 8 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,256Updated 6 months ago
- Original PoC for CVE-2023-32784☆638Updated last year