22XploiterCrew-Team / Hash-Cracking
CRACK AND CHECK HASH TYPES IN BULK
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hash-Cracking
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆19Updated 3 years ago
- A Fast & free Windows remote administration tool.☆10Updated 2 years ago
- Free Email Providers☆10Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- An exotic service bruteforce tool.☆12Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated 10 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 4 months ago
- Free Advance encryptor for Anon Cloud☆17Updated last year
- Poc script for ProxyShell exploit chain in Exchange Server☆16Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Burp suite Certificate modification tool☆17Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Kibana app for RedELK☆16Updated last year