Hashmash is a tool to aid in generating hashes from user supplied values and Epochs
☆63Aug 30, 2016Updated 9 years ago
Alternatives and similar repositories for Hashmash
Users that are interested in Hashmash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 11 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The reverse shell client is a Python based alternative for a netcat reverse shell listener☆18Sep 18, 2015Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Homemade scripts to-do various vulnerable challenges☆80Jan 7, 2021Updated 5 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆14Dec 17, 2018Updated 7 years ago
- ☆26Oct 14, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collection of my scripts ranging from bash or python or shell. Readme will contain list of which script does what.☆41Feb 20, 2026Updated 3 months ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 10 years ago
- kdf password strengthener☆10Dec 26, 2019Updated 6 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 5 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Apr 19, 2015Updated 11 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Simple vulnerability scanning framework☆51Oct 29, 2016Updated 9 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- Metasploit automation. Why work when a minion can do it?☆21May 9, 2017Updated 9 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Secure random passwords in Javascript☆14Apr 21, 2024Updated 2 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Simple PHP script to mass deface sites on the same server☆12Sep 30, 2020Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆168Aug 23, 2019Updated 6 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago