noraj / haitiLinks
Hash type identifier (CLI & lib)
☆922Updated 3 months ago
Alternatives and similar repositories for haiti
Users that are interested in haiti are comparing it to the libraries listed below
Sorting:
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,486Updated 2 months ago
- Penelope Shell Handler☆1,355Updated this week
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆626Updated this week
- Collection of reverse shells for red team operations.☆524Updated 8 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆616Updated 4 years ago
- Generates millions of keyword-based password mutations in seconds.☆1,385Updated 6 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,128Updated 2 weeks ago
- Sticky notes for pentesting, bug bounty, CTF.☆759Updated 4 months ago
- Real-world infosec wordlists, updated regularly☆1,597Updated this week
- Multi-threaded Python Port Scanner with Nmap Integration☆381Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking topics.☆991Updated last month
- ☆1,142Updated 4 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,421Updated 9 months ago
- ☆218Updated 5 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,617Updated 9 months ago
- An XSS exploitation command-line interface and payload generator.☆1,404Updated 10 months ago
- Username tools for penetration testing☆1,241Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,452Updated 8 months ago
- Original PoC for CVE-2023-32784☆646Updated 2 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,621Updated 3 months ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,271Updated last week
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆294Updated 3 years ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,269Updated 2 months ago
- WhiteWinterWolf's PHP web shell☆730Updated 8 years ago
- Identify privilege escalation paths within and across different clouds☆705Updated this week
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,303Updated 7 months ago
- Orange Cyberdefense mindmaps☆1,496Updated 9 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,281Updated 2 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,343Updated 7 months ago
- Local file inclusion exploitation tool☆907Updated 2 months ago