psypanda / hashIDLinks
Software to identify the different types of hashes -
☆1,425Updated 3 years ago
Alternatives and similar repositories for hashID
Users that are interested in hashID are comparing it to the libraries listed below
Sorting:
- DNS Enumeration Script☆2,875Updated this week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,788Updated 5 months ago
- dnsenum is a perl script that enumerates DNS information☆663Updated 6 years ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,730Updated last year
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,467Updated last year
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆1,014Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,072Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆1,790Updated last year
- Weaponized web shell☆3,405Updated last month
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆847Updated 8 months ago
- PACK (Password Analysis and Cracking Kit)☆858Updated 5 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,093Updated 3 years ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,518Updated 6 years ago
- Various webshells. We accept pull requests for additions to this collection.☆983Updated 2 years ago
- A default credential scanner.☆1,501Updated 3 months ago
- Pop shells like a master.☆1,477Updated 6 years ago
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,475Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,319Updated 4 years ago
- CeWL is a Custom Word List Generator☆2,433Updated last week
- Detect and decode encoded strings, recursively.☆905Updated last month
- Network Infrastructure Penetration Testing Tool☆1,660Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,172Updated 2 months ago
- Linux Exploit Suggester; based on operating system release number☆1,804Updated 11 years ago
- SMBMap is a handy SMB enumeration tool☆1,965Updated 8 months ago
- Ncrack network authentication tool☆1,164Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,778Updated 5 years ago
- Automated script for performing Padding Oracle attacks☆795Updated last year
- Miscellaneous exploit code☆1,561Updated 2 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,924Updated 2 years ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆809Updated 5 months ago