DarkWolf-Labs / ft-crackLinks
☆18Updated 9 months ago
Alternatives and similar repositories for ft-crack
Users that are interested in ft-crack are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆100Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆14Updated last year
- ☆26Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- F5 Service Password Decryption☆20Updated this week
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 7 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Repo hacks☆20Updated 3 months ago
- Top hashpwn rules☆20Updated 8 months ago
- top usernames from azure survey 2025☆14Updated 3 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 9 months ago
- A user enumeration tool for Slack.☆30Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Fuzz Network Traffic☆18Updated 7 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆77Updated 2 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 5 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- self-hosted Azure OSINT tool☆31Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 11 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆43Updated 3 weeks ago
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 4 months ago
- Still point in moving world.☆51Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆61Updated 8 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 9 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 5 months ago