Hashmash is a tool to aid in generating hashes from user supplied values and Epochs
☆63Aug 30, 2016Updated 9 years ago
Alternatives and similar repositories for Hashmash
Users that are interested in Hashmash are comparing it to the libraries listed below
Sorting:
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- ☆25Oct 14, 2017Updated 8 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- Secure random passwords in Javascript☆14Apr 21, 2024Updated last year
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- ☆16Aug 11, 2020Updated 5 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- Simple vulnerability scanning framework☆51Oct 29, 2016Updated 9 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- script starter templates☆15Aug 14, 2020Updated 5 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 3 months ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago