psypanda / hashIDLinks
Software to identify the different types of hashes -
☆1,420Updated 3 years ago
Alternatives and similar repositories for hashID
Users that are interested in hashID are comparing it to the libraries listed below
Sorting:
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,770Updated 4 months ago
- DNS Enumeration Script☆2,861Updated this week
- Network Infrastructure Penetration Testing Tool☆1,654Updated 4 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,460Updated last year
- dnsenum is a perl script that enumerates DNS information☆656Updated 5 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,912Updated 2 years ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,515Updated 6 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆846Updated 7 months ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,461Updated 3 years ago
- A default credential scanner.☆1,497Updated 2 months ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,081Updated 2 years ago
- Sniffs sensitive data from interface or pcap☆1,780Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,725Updated last year
- SMBMap is a handy SMB enumeration tool☆1,948Updated 6 months ago
- Detect and decode encoded strings, recursively.☆901Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,752Updated 5 years ago
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆995Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,318Updated 4 years ago
- CeWL is a Custom Word List Generator☆2,372Updated 10 months ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,071Updated 4 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,300Updated this week
- Weaponized web shell☆3,371Updated 11 months ago
- Ncrack network authentication tool☆1,156Updated last year
- Miscellaneous exploit code☆1,557Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,802Updated 11 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆612Updated last year
- PACK (Password Analysis and Cracking Kit)☆854Updated 5 years ago
- Various webshells. We accept pull requests for additions to this collection.☆977Updated last year
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆797Updated 4 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,570Updated 11 months ago