Decrypt Hashes. md5, sha-1, sha-256, shaw-512(unix), and Windows NT hashes. Multi-threaded and includes a saftey to prevent cpu exhaustion
☆20Dec 18, 2024Updated last year
Alternatives and similar repositories for HashKiller
Users that are interested in HashKiller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆63Jan 7, 2026Updated 3 months ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of advanced PHP and ASPX web shells designed to bypass security measures.☆66Mar 30, 2026Updated 2 weeks ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- Scapy sockets to communicate with Bluetooth controllers☆21Mar 2, 2026Updated last month
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆18Oct 25, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Quickly create a list of dorks based on variables entered.☆18Mar 7, 2026Updated last month
- Okadminfinder rewrite by Xnuvers007☆16Apr 13, 2021Updated 5 years ago
- Analysis Plugin and Tools for Vivisect☆21Dec 1, 2025Updated 4 months ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 4 years ago
- This repository was created to put into practice the knowledge acquired in hacking courses at Escola de Hackers with master and mentor Ma…☆19Jul 8, 2024Updated last year
- HideMePlease is a new generation tool to hide phising web links into legitimate web links with original domains (eg: facebook.com, instag…☆31Jun 3, 2024Updated last year
- Herramienta automatizada para enviar correos con phising.☆16Jul 29, 2020Updated 5 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.☆14Jun 24, 2020Updated 5 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated last year
- DDoS Attack Using Termux☆23Jan 3, 2023Updated 3 years ago
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆23Jun 12, 2021Updated 4 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Feb 24, 2020Updated 6 years ago
- Gitbook: kashz-Jewels☆21Jul 1, 2025Updated 9 months ago
- 📡PoC auto collect from GitHub.☆12May 3, 2020Updated 5 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆12May 7, 2025Updated 11 months ago
- The Site Scraper Tool is an ethical hacking program developed in Python that enables users to clone websites for educational purposes by …☆24Sep 20, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Track any ip address with IP-Tracer. IP-Tracer is developed for linux and android terminal like Termux and GNURoot Debian. you can retrie…☆32Apr 2, 2020Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Best Tools For DoS☆20May 17, 2024Updated last year
- Journey to Try Harder !!!☆31Aug 30, 2019Updated 6 years ago
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆22Mar 26, 2026Updated 2 weeks ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago