rebootuser / Hashmash
Hashmash is a tool to aid in generating hashes from user supplied values and Epochs
☆62Updated 8 years ago
Alternatives and similar repositories for Hashmash:
Users that are interested in Hashmash are comparing it to the libraries listed below
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Scripts for Deploying new server☆48Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 5 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- ☆55Updated 4 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆48Updated 4 years ago
- Just a collection of pentest stuffs☆95Updated 5 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- WhiteBox CMS analysis☆69Updated last year
- Pillage a git repo found in an accessible web root☆60Updated 13 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- PwnWiki - The notes section of the pentesters mind.☆24Updated 10 years ago
- Tools used for Penetration testing / Red Teaming☆64Updated 6 years ago
- ProFTPD IAC Remote Root Exploit☆38Updated 7 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 8 months ago
- ☆26Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Advanced XPath Injection Tool☆34Updated 9 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Extreme Vulnerable Node Application☆93Updated 6 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago