Chronos-EaaS / Chronos-ControlLinks
Chronos is a system for the automation of the entire systems evaluation workflow.
☆96Updated 2 months ago
Alternatives and similar repositories for Chronos-Control
Users that are interested in Chronos-Control are comparing it to the libraries listed below
Sorting:
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆561Updated 9 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Updated 2 years ago
- Malicious Macro Generator☆830Updated 6 years ago
- Embed and hide any file in an HTML file☆494Updated 8 years ago
- Standalone password candidate generator using the PRINCE algorithm☆478Updated 2 years ago
- ADAMpro is a database system to store and retrieve multimedia data. It provides Boolean retrieval and similarity search and makes use of …☆16Updated 4 years ago
- An all-in-one WPA/WPS toolkit☆430Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Updated 2 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- Pipal, THE password analyser☆660Updated 2 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 7 years ago
- JackIt - Exploit Code for Mousejack☆886Updated 5 years ago
- Plugins for Metasploit Framework☆477Updated 7 years ago
- Hashtopolis - distributed password cracking with Hashcat☆1,708Updated last week
- Run Hak5 Bash Bunny scripts on a raspbery pi☆249Updated 8 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Updated last year
- SensePost's modified hostapd for wifi attacks.☆599Updated last year
- Hashcat web interface☆322Updated 11 months ago
- Converter for raw RubberDucky payloads to Digispark Arduino IDE Sketch source.☆496Updated 7 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆479Updated 6 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Updated 8 years ago
- Windows passwords decryption from dump files☆511Updated 3 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Updated 2 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆359Updated last year
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆444Updated 2 years ago
- WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, …☆596Updated 5 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆960Updated 5 years ago
- VBA Obfuscation Tools combined with an MS office document generator☆553Updated 8 years ago
- ☆242Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 9 years ago