s0md3v / Hash-BusterLinks
Crack hashes in seconds.
☆1,846Updated last year
Alternatives and similar repositories for Hash-Buster
Users that are interested in Hash-Buster are comparing it to the libraries listed below
Sorting:
- Striker is an offensive information and vulnerability scanner.☆2,317Updated 2 years ago
- Reconnaissance Swiss Army Knife☆1,979Updated 4 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,552Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,230Updated 3 years ago
- Automatically brute force all services running on a target.☆2,169Updated last year
- Image Payload Creating/Injecting tools☆1,267Updated 2 years ago
- Find exploits in local and online databases instantly☆1,783Updated 4 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,521Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,338Updated 2 weeks ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,737Updated last year
- Find web directories without bruteforce☆1,947Updated 2 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,731Updated last year
- An advanced multithreaded admin panel finder written in python.☆828Updated last year
- Advanced reconnaissance utility☆988Updated 2 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,701Updated 2 years ago
- Search for leaked credentials☆1,369Updated 4 years ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,841Updated 2 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,057Updated last week
- The New Hacking Framework☆703Updated 4 years ago
- Know the dangers of credential reuse attacks.☆2,073Updated last year
- Intelligent login bruteforcer.☆899Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,149Updated 2 years ago
- massive SQL injection vulnerability scanner☆1,227Updated 7 years ago
- MSFvenom Payload Creator (MSFPC)☆1,299Updated 4 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,493Updated 4 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,928Updated 3 weeks ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,407Updated last year
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,429Updated 7 years ago
- Phishing Campaign Toolkit☆2,489Updated 4 months ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,069Updated last year