CRACK AND CHECK HASH TYPES IN BULK
☆13Jul 28, 2021Updated 4 years ago
Alternatives and similar repositories for Hash-Cracking
Users that are interested in Hash-Cracking are comparing it to the libraries listed below
Sorting:
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- ☆15Oct 29, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated last week
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 5 months ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- ☆17May 17, 2023Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- ☆44Jul 5, 2024Updated last year
- gxsuid is a powerful tool for interacting with Instagram profiles. It offers comprehensive functionalities such as searching by user ID o…☆27Sep 30, 2024Updated last year
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Jun 9, 2025Updated 8 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.☆24Oct 31, 2022Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Document created to serve as a first step to learn about blockchain and smart contract security.☆19Sep 20, 2021Updated 4 years ago
- An Simple PHP Webshell Manager to bypassed security system☆22Aug 11, 2024Updated last year
- ☆15Sep 21, 2019Updated 6 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆26May 22, 2023Updated 2 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago