Find and notify users in your Active Directory with weak passwords
☆103Sep 4, 2021Updated 4 years ago
Alternatives and similar repositories for Crack-O-Matic
Users that are interested in Crack-O-Matic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825Nov 15, 2025Updated 4 months ago
- SentinelOne Windows Installation Diagnostic☆12Apr 14, 2025Updated 11 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Domain Password Audit Tool for Pentesters☆1,029Dec 24, 2025Updated 3 months ago
- ☆185Jan 5, 2021Updated 5 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- Sys Mon! Why yu nuh logging dat?☆12Dec 10, 2018Updated 7 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- ☆17Jan 21, 2026Updated 2 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Dec 27, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆399Nov 26, 2020Updated 5 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆163Apr 19, 2020Updated 5 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- An open source project aimed to replicate the Windows SIFT Machine and tools used during SANS Courses minus any payware software.☆25Oct 18, 2023Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆722Dec 6, 2024Updated last year