0x6470 / bitwarden2hashcat
A tool that converts Bitwarden's data into a hashcat-suitable hash
☆21Updated 2 years ago
Alternatives and similar repositories for bitwarden2hashcat:
Users that are interested in bitwarden2hashcat are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 4 years ago
- Simple Karma Attack☆66Updated 4 years ago
- A database for storing, querying and doing stats on credential leaks☆38Updated last year
- WebHook for Red Team☆24Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆51Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 2 months ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆28Updated 6 months ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆20Updated 5 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆35Updated 2 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆12Updated last week
- Red Team Tool Kit☆15Updated 5 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆15Updated 2 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆20Updated 6 years ago
- Detect & filter duplicate hashcat rules☆41Updated this week
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- ☆34Updated 6 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Free Advance encryptor for Anon Cloud☆17Updated last year