psypanda / hashID
Software to identify the different types of hashes -
☆1,374Updated 2 years ago
Alternatives and similar repositories for hashID:
Users that are interested in hashID are comparing it to the libraries listed below
- DNS Enumeration Script☆2,759Updated last week
- Weaponized web shell☆3,293Updated 6 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,710Updated 2 months ago
- CeWL is a Custom Word List Generator☆2,206Updated 6 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,280Updated 6 months ago
- SMBMap is a handy SMB enumeration tool☆1,894Updated 2 months ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,441Updated last year
- Ncrack network authentication tool☆1,123Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,678Updated 8 months ago
- Web application fuzzer☆6,162Updated 8 months ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,058Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,661Updated 4 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated 2 months ago
- dnsenum is a perl script that enumerates DNS information☆634Updated 5 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,788Updated 2 years ago
- Linux Exploit Suggester; based on operating system release number☆1,786Updated 10 years ago
- Sniffs sensitive data from interface or pcap☆1,749Updated last year
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,598Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,734Updated 3 months ago
- Network Infrastructure Penetration Testing Tool☆1,645Updated 3 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,238Updated 2 weeks ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,863Updated last year
- Miscellaneous exploit code☆1,550Updated last year
- Pipal, THE password analyser☆643Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,810Updated 3 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆597Updated 11 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,053Updated 9 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,248Updated this week
- Subdomain enumeration and information gathering tool☆1,288Updated 2 weeks ago