AdrianVollmer / Crack-O-MaticView external linksLinks
Find and notify users in your Active Directory with weak passwords
☆103Sep 4, 2021Updated 4 years ago
Alternatives and similar repositories for Crack-O-Matic
Users that are interested in Crack-O-Matic are comparing it to the libraries listed below
Sorting:
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- Domain Password Audit Tool for Pentesters☆1,023Dec 24, 2025Updated last month
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- large hashcat rulesets generated from real-world compromised passwords☆399Nov 26, 2020Updated 5 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Apr 19, 2020Updated 5 years ago
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆492Jul 23, 2020Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- SentinelOne Windows Installation Diagnostic☆11Apr 14, 2025Updated 10 months ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆304Nov 13, 2021Updated 4 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago