Crack hashes in seconds.
☆1,868Dec 10, 2024Updated last year
Alternatives and similar repositories for Hash-Buster
Users that are interested in Hash-Buster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Striker is an offensive information and vulnerability scanner.☆2,322Jun 4, 2023Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆838May 17, 2024Updated last year
- Intelligent login bruteforcer.☆912Apr 27, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,022Jan 26, 2021Updated 5 years ago
- JShell - Get a JavaScript shell with XSS.☆533May 5, 2019Updated 6 years ago
- Cloak can backdoor any python script with some tricks.☆502May 5, 2019Updated 6 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆452May 5, 2019Updated 6 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Mass scan IPs for vulnerable services☆1,047Feb 17, 2022Updated 4 years ago
- CSRF Scanner☆586Jun 28, 2024Updated last year
- Most advanced XSS scanner.☆14,822Apr 26, 2025Updated 10 months ago
- A python module for dumping usable proxies.☆164Nov 13, 2019Updated 6 years ago
- Detect and decode encoded strings, recursively.☆925Sep 16, 2025Updated 6 months ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- Incredibly fast crawler designed for OSINT.☆12,755Feb 10, 2026Updated last month
- HTTP parameter discovery suite.☆6,142Feb 20, 2025Updated last year
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,570Jul 31, 2024Updated last year
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credential…☆2,385Updated this week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,454Nov 3, 2018Updated 7 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,810Updated this week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,928Aug 15, 2023Updated 2 years ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- Automatically brute force all services running on a target.☆2,230Aug 18, 2024Updated last year
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,920Apr 13, 2022Updated 3 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 8 months ago
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- Generate Email, Register for anything, Get the OTP/Link☆589Oct 4, 2023Updated 2 years ago
- Blockchain Transactions Investigation Tool☆595Jul 15, 2022Updated 3 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,675Mar 16, 2026Updated last week
- File upload vulnerability scanner and exploitation tool.☆3,305May 8, 2025Updated 10 months ago
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 6 months ago
- Undetectable Windows Payload Generation☆1,609Nov 8, 2022Updated 3 years ago
- Automated Mass Exploiter☆5,217May 22, 2023Updated 2 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,560Nov 14, 2023Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,293Jul 10, 2024Updated last year