s0md3v / Hash-Buster
Crack hashes in seconds.
☆1,749Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Hash-Buster
- Efficient and advanced man in the middle framework☆2,043Updated last year
- Reconnaissance Swiss Army Knife☆1,809Updated 3 years ago
- Automatically brute force all services running on a target.☆1,966Updated 2 months ago
- Find exploits in local and online databases instantly☆1,634Updated 3 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,419Updated 2 months ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,465Updated 11 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,035Updated this week
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,671Updated 3 weeks ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,128Updated 2 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,808Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,229Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,657Updated 3 weeks ago
- Image Payload Creating/Injecting tools☆1,202Updated 11 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,212Updated 6 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,522Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,045Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,226Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,000Updated last year
- Python antivirus evasion tool☆1,390Updated last year
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,292Updated 11 months ago
- Know the dangers of credential reuse attacks.☆2,020Updated 3 weeks ago
- venom - C2 shellcode generator/compiler/handler☆1,782Updated 11 months ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,329Updated 4 years ago
- Mass scan IPs for vulnerable services☆1,024Updated 2 years ago
- Common User Passwords Profiler (CUPP)☆4,491Updated 11 months ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,559Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,245Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆723Updated 4 years ago