Crack hashes in seconds.
☆1,873Dec 10, 2024Updated last year
Alternatives and similar repositories for Hash-Buster
Users that are interested in Hash-Buster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Striker is an offensive information and vulnerability scanner.☆2,325Jun 4, 2023Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆841May 17, 2024Updated last year
- Intelligent login bruteforcer.☆914Apr 27, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,029Jan 26, 2021Updated 5 years ago
- JShell - Get a JavaScript shell with XSS.☆534May 5, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cloak can backdoor any python script with some tricks.☆504May 5, 2019Updated 6 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆452May 5, 2019Updated 6 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Mass scan IPs for vulnerable services☆1,047Feb 17, 2022Updated 4 years ago
- CSRF Scanner☆587Jun 28, 2024Updated last year
- Most advanced XSS scanner.☆14,872Apr 26, 2025Updated 11 months ago
- A python module for dumping usable proxies.☆165Nov 13, 2019Updated 6 years ago
- Detect and decode encoded strings, recursively.☆926Sep 16, 2025Updated 6 months ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Incredibly fast crawler designed for OSINT.☆12,807Feb 10, 2026Updated 2 months ago
- HTTP parameter discovery suite.☆6,184Feb 20, 2025Updated last year
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 3 years ago
- Find exploits in local and online databases instantly☆1,808Sep 27, 2021Updated 4 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,577Jul 31, 2024Updated last year
- Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credential…☆2,402Apr 6, 2026Updated last week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,818Updated this week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,950Aug 15, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- Automatically brute force all services running on a target.☆2,241Aug 18, 2024Updated last year
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- A default credential scanner.☆1,504Jul 8, 2025Updated 9 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,925Apr 13, 2022Updated 4 years ago
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- Generate Email, Register for anything, Get the OTP/Link☆590Oct 4, 2023Updated 2 years ago
- Blockchain Transactions Investigation Tool☆598Jul 15, 2022Updated 3 years ago
- File upload vulnerability scanner and exploitation tool.☆3,310May 8, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Automated All-in-One OS Command Injection Exploitation Tool☆5,700Apr 4, 2026Updated last week
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 7 months ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,563Nov 14, 2023Updated 2 years ago
- Undetectable Windows Payload Generation☆1,610Nov 8, 2022Updated 3 years ago
- Automated Mass Exploiter☆5,228May 22, 2023Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,296Jul 10, 2024Updated last year