psypanda / hashID
Software to identify the different types of hashes -
☆1,356Updated 2 years ago
Alternatives and similar repositories for hashID:
Users that are interested in hashID are comparing it to the libraries listed below
- DNS Enumeration Script☆2,689Updated this week
- Weaponized web shell☆3,234Updated 3 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,106Updated 2 months ago
- SMBMap is a handy SMB enumeration tool☆1,825Updated 2 weeks ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,476Updated 5 years ago
- CeWL is a Custom Word List Generator☆2,054Updated 2 months ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,637Updated 4 months ago
- Linux Exploit Suggester; based on operating system release number☆1,780Updated 10 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,069Updated this week
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,005Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,296Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,579Updated 4 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,682Updated this week
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,696Updated 2 months ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,377Updated 3 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,470Updated 3 months ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,836Updated 6 months ago
- ☆3,501Updated 10 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,826Updated last year
- A tool to dump the login password from the current linux user☆3,867Updated last year
- Automated NoSQL database enumeration and web application exploitation tool.☆2,980Updated 5 months ago
- A swiss army knife for pentesting networks☆8,542Updated last year
- Advanced vulnerability scanning with Nmap NSE☆3,522Updated 4 months ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,398Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,626Updated 3 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,850Updated 8 months ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,046Updated 3 years ago
- NSE script based on Vulners.com API☆3,251Updated 9 months ago
- Miscellaneous exploit code☆1,531Updated last year
- SSH man-in-the-middle tool☆1,638Updated 3 years ago