psypanda / hashIDLinks
Software to identify the different types of hashes -
☆1,438Updated 3 years ago
Alternatives and similar repositories for hashID
Users that are interested in hashID are comparing it to the libraries listed below
Sorting:
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,827Updated 7 months ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,529Updated 6 years ago
- Ncrack network authentication tool☆1,179Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,749Updated last year
- DNS Enumeration Script☆2,917Updated this week
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,477Updated 2 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,081Updated 4 years ago
- A default credential scanner.☆1,500Updated 5 months ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆845Updated 10 months ago
- dnsenum is a perl script that enumerates DNS information☆673Updated 6 years ago
- Detect and decode encoded strings, recursively.☆915Updated 3 months ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,103Updated 3 years ago
- Network Infrastructure Penetration Testing Tool☆1,664Updated 4 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,936Updated last month
- PACK (Password Analysis and Cracking Kit)☆863Updated 6 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,344Updated this week
- Miscellaneous exploit code☆1,568Updated 2 years ago
- Sniffs sensitive data from interface or pcap☆1,804Updated 2 years ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,483Updated 3 years ago
- Various webshells. We accept pull requests for additions to this collection.☆998Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,519Updated 2 months ago
- Command line utility for searching and downloading exploits☆1,796Updated 3 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,321Updated 4 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,644Updated 5 years ago
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆1,031Updated last year
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,014Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆2,001Updated last month
- Automated NoSQL database enumeration and web application exploitation tool.☆3,211Updated 4 months ago
- Pop shells like a master.☆1,484Updated 6 years ago
- Linux Exploit Suggester; based on operating system release number☆1,808Updated 11 years ago