22XploiterCrew-Team / Hash-Cracking
CRACK AND CHECK HASH TYPES IN BULK
☆12Updated 3 years ago
Alternatives and similar repositories for Hash-Cracking:
Users that are interested in Hash-Cracking are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- An exotic service bruteforce tool.☆12Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Free Email Providers☆10Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆17Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 7 months ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆18Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A tool for simplifying the process of researching IOCs.☆24Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- Burp suite Certificate modification tool☆18Updated last year