0x6470 / bitwarden2hashcatLinks
A tool that converts Bitwarden's data into a hashcat-suitable hash
☆23Updated 3 years ago
Alternatives and similar repositories for bitwarden2hashcat
Users that are interested in bitwarden2hashcat are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆90Updated last year
- Simple Karma Attack☆69Updated 4 years ago
- Official python agent for using the distributed hashcracker Hashtopolis☆74Updated this week
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Docker images for learning wifi hacking☆69Updated 6 years ago
- Hash cracking WebApp & Server for hashcat☆46Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆47Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- ☆53Updated 4 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated last month
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Command line interface to interact with hashes.com escrow service.☆37Updated last month
- Malicious Link Blog☆25Updated last year
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- CLI tools using Harpoon features☆22Updated last year
- ☆33Updated 7 months ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆71Updated 9 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆40Updated 2 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago