noraj / haitiLinks
Hash type identifier (CLI & lib)
☆890Updated last week
Alternatives and similar repositories for haiti
Users that are interested in haiti are comparing it to the libraries listed below
Sorting:
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,393Updated this week
- Penelope Shell Handler☆1,004Updated 2 weeks ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆622Updated 9 months ago
- Collection of reverse shells for red team operations.☆508Updated 4 months ago
- ☆212Updated 5 years ago
- Sticky notes for pentesting, bug bounty, CTF.☆716Updated 2 weeks ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,583Updated 5 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆569Updated 3 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,354Updated 5 months ago
- Multi-threaded Python Port Scanner with Nmap Integration☆371Updated 2 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆291Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,413Updated 4 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆628Updated last week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,048Updated last week
- Real-world infosec wordlists, updated regularly☆1,544Updated this week
- Generates millions of keyword-based password mutations in seconds.☆1,332Updated 2 months ago
- An XSS exploitation command-line interface and payload generator.☆1,389Updated 6 months ago
- Hardware/IOT Pentesting Wiki☆687Updated last week
- This project is aimed at freely providing technical guides on various hacking topics.☆908Updated 3 weeks ago
- ☆1,129Updated 4 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- Script for generating revshells☆476Updated 11 months ago
- Original PoC for CVE-2023-32784☆646Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,198Updated last week
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆400Updated 6 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,243Updated 3 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,438Updated 3 weeks ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,097Updated this week
- Software to identify the different types of hashes used to encrypt data and especially passwords☆610Updated last year
- Pentester's Promiscuous Notebook☆499Updated last week