rebootuser / Hashmash
Hashmash is a tool to aid in generating hashes from user supplied values and Epochs
☆63Updated 8 years ago
Alternatives and similar repositories for Hashmash:
Users that are interested in Hashmash are comparing it to the libraries listed below
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- ☆26Updated 8 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Advanced XPath Injection Tool☆34Updated 9 years ago
- Scripts for Deploying new server☆48Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆65Updated 6 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Pillage a git repo found in an accessible web root☆61Updated 13 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 9 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆66Updated last year
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Web shells for use in penetration testing☆39Updated 10 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- scripts for pentesting☆87Updated 6 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago