Crack hashes in seconds.
☆1,863Dec 10, 2024Updated last year
Alternatives and similar repositories for Hash-Buster
Users that are interested in Hash-Buster are comparing it to the libraries listed below
Sorting:
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- Intelligent login bruteforcer.☆909Apr 27, 2023Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆836May 17, 2024Updated last year
- Reconnaissance Swiss Army Knife☆2,015Jan 26, 2021Updated 5 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Cloak can backdoor any python script with some tricks.☆501May 5, 2019Updated 6 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆450May 5, 2019Updated 6 years ago
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- Mass scan IPs for vulnerable services☆1,046Feb 17, 2022Updated 4 years ago
- HTTP parameter discovery suite.☆6,091Feb 20, 2025Updated last year
- Most advanced XSS scanner.☆14,773Apr 26, 2025Updated 10 months ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,374Feb 23, 2026Updated last week
- Automatically brute force all services running on a target.☆2,222Aug 18, 2024Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,807Feb 23, 2026Updated last week
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,563Jul 31, 2024Updated last year
- Inject malicious code into *.debs☆284Apr 26, 2022Updated 3 years ago
- CSRF Scanner☆584Jun 28, 2024Updated last year
- Incredibly fast crawler designed for OSINT.☆12,712Feb 10, 2026Updated 3 weeks ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Detect and decode encoded strings, recursively.☆923Sep 16, 2025Updated 5 months ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 7 months ago
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated 2 weeks ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,900Aug 15, 2023Updated 2 years ago
- Undetectable Windows Payload Generation☆1,607Nov 8, 2022Updated 3 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,914Apr 13, 2022Updated 3 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380May 22, 2020Updated 5 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,640Feb 22, 2026Updated last week
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 5 months ago
- File upload vulnerability scanner and exploitation tool.☆3,300May 8, 2025Updated 9 months ago
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,227Nov 20, 2025Updated 3 months ago
- Advanced reconnaissance utility☆994Nov 20, 2023Updated 2 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,291Jul 10, 2024Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,903Sep 27, 2021Updated 4 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,519Apr 9, 2024Updated last year
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago