noraj / haitiLinks
Hash type identifier (CLI & lib)
☆884Updated last month
Alternatives and similar repositories for haiti
Users that are interested in haiti are comparing it to the libraries listed below
Sorting:
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,359Updated 3 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆619Updated 8 months ago
- Penelope Shell Handler☆969Updated last week
- Collection of reverse shells for red team operations.☆502Updated 3 months ago
- ☆211Updated 4 years ago
- Generates millions of keyword-based password mutations in seconds.☆1,332Updated last month
- Sticky notes for pentesting, bug bounty, CTF.☆705Updated 2 months ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆291Updated 3 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,340Updated 4 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,016Updated last week
- Username tools for penetration testing☆1,103Updated 9 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,571Updated 4 months ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆500Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆555Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking topics.☆893Updated last month
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,204Updated last month
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,227Updated 2 months ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,177Updated 11 months ago
- Real-world infosec wordlists, updated regularly☆1,534Updated last week
- Original PoC for CVE-2023-32784☆643Updated last year
- Active Directory and Internal Pentest Cheatsheets☆1,603Updated 2 weeks ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆627Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.☆1,382Updated 5 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,184Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwords☆610Updated last year
- ☆1,120Updated 4 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,172Updated last month
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,012Updated last week
- Multi-threaded Python Port Scanner with Nmap Integration☆370Updated 2 years ago
- Hardware/IOT Pentesting Wiki☆674Updated 2 months ago