vaishnavpardhi / colabsthLinks
Run search-that-hash from Google colab with fast offline (hashcat) mode
☆35Updated 4 years ago
Alternatives and similar repositories for colabsth
Users that are interested in colabsth are comparing it to the libraries listed below
Sorting:
- ☆19Updated 4 years ago
- Just another vulnerable web application.☆36Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Dehashed API CLI☆21Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- A WLAN red team framework.☆155Updated last year
- ☆27Updated 5 years ago
- Field guide to gather low-hanging fruits☆13Updated 7 months ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Compiled binaries of various security tools☆14Updated 4 years ago
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- Top password lists generated from leaks collected from different paste sites☆31Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- ☆43Updated 6 months ago