psypanda / hashIDLinks
Software to identify the different types of hashes -
☆1,378Updated 2 years ago
Alternatives and similar repositories for hashID
Users that are interested in hashID are comparing it to the libraries listed below
Sorting:
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,251Updated 3 weeks ago
- DNS Enumeration Script☆2,776Updated last week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,729Updated last week
- SMBMap is a handy SMB enumeration tool☆1,909Updated 3 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,603Updated 4 years ago
- Ncrack network authentication tool☆1,136Updated last year
- A default credential scanner.☆1,482Updated 3 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,444Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,687Updated 9 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,544Updated 7 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,834Updated last year
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,434Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Sniffs sensitive data from interface or pcap☆1,753Updated last year
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,499Updated 5 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,309Updated 7 months ago
- Metadata harvester☆1,112Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,285Updated last year
- Veil Evasion is no longer supported, use Veil 3.0!☆1,835Updated 3 years ago
- Weaponized web shell☆3,301Updated 7 months ago
- CeWL is a Custom Word List Generator☆2,237Updated 7 months ago
- pwning IPv4 via IPv6☆1,790Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,676Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,739Updated 4 months ago
- ☆3,593Updated last year
- Find exploits in local and online databases instantly☆1,738Updated 3 years ago
- dnsenum is a perl script that enumerates DNS information☆638Updated 5 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,939Updated last year
- ☆1,203Updated 5 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆511Updated last year