Hashmash is a tool to aid in generating hashes from user supplied values and Epochs
☆63Aug 30, 2016Updated 9 years ago
Alternatives and similar repositories for Hashmash
Users that are interested in Hashmash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- ☆25Oct 14, 2017Updated 8 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 9 years ago
- kdf password strengthener☆10Dec 26, 2019Updated 6 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Apr 19, 2015Updated 10 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Simple vulnerability scanning framework☆51Oct 29, 2016Updated 9 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- Metasploit automation. Why work when a minion can do it?☆21May 9, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Secure random passwords in Javascript☆14Apr 21, 2024Updated last year
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- Local Privilege Escalation☆210Feb 28, 2017Updated 9 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 4 months ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago