psypanda / hashIDLinks
Software to identify the different types of hashes -
☆1,432Updated 3 years ago
Alternatives and similar repositories for hashID
Users that are interested in hashID are comparing it to the libraries listed below
Sorting:
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,744Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,817Updated 6 months ago
- DNS Enumeration Script☆2,911Updated this week
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,521Updated 6 years ago
- dnsenum is a perl script that enumerates DNS information☆671Updated 6 years ago
- A default credential scanner.☆1,500Updated 5 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,928Updated 3 weeks ago
- Sniffs sensitive data from interface or pcap☆1,798Updated 2 years ago
- Ncrack network authentication tool☆1,174Updated last year
- DotDotPwn - The Directory Traversal Fuzzer☆1,100Updated 3 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,472Updated last year
- CeWL is a Custom Word List Generator☆2,495Updated last month
- Network Infrastructure Penetration Testing Tool☆1,663Updated 4 years ago
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,480Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,200Updated 3 months ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,079Updated 4 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,015Updated 4 years ago
- Weaponized web shell☆3,449Updated 2 months ago
- PACK (Password Analysis and Cracking Kit)☆860Updated 6 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆845Updated 10 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,342Updated 3 weeks ago
- Miscellaneous exploit code☆1,563Updated 2 years ago
- Linux Exploit Suggester; based on operating system release number☆1,806Updated 11 years ago
- SMBMap is a handy SMB enumeration tool☆1,984Updated last week
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆828Updated 7 months ago
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆1,028Updated last year
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,478Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,320Updated 4 years ago
- Detect and decode encoded strings, recursively.☆912Updated 2 months ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,009Updated 4 years ago