sam-b / HashData
A command line Hash Identifying tool.
☆101Updated 5 years ago
Alternatives and similar repositories for HashData:
Users that are interested in HashData are comparing it to the libraries listed below
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Mass scanning and fuzzing library☆49Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- ☆73Updated 2 years ago
- ☆20Updated last year
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- Source Code Intelligence☆30Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Unix remote login tool, rootkit shell tool☆35Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Slides from previous conference talks☆41Updated 7 years ago
- Faraday Continuous Scanning☆33Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆42Updated 8 years ago
- BSidesSF CTF 2017 release☆126Updated 2 years ago
- Image size issues plugin for Burp Suite☆93Updated 6 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- ☆50Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆62Updated 9 years ago