GhostPack / DeepPassLinks
Hunting for passwords with deep learning
☆226Updated last year
Alternatives and similar repositories for DeepPass
Users that are interested in DeepPass are comparing it to the libraries listed below
Sorting:
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆204Updated 5 months ago
- ☆105Updated last year
- ☆114Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- ☆166Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Roast in the Middle☆293Updated 3 weeks ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- Open-Source Collection of Social Engineering Pretexts☆141Updated last year
- ☆140Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆257Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆442Updated last year
- ☆99Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- Phishing Framework for Pentesters☆198Updated 2 years ago
- SpecterOps Presentations☆209Updated 3 months ago
- ☆191Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆126Updated last year
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆218Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A Red Team Activity Hub☆222Updated last week
- Your template-based BloodHound terminal companion tool☆433Updated last month
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆337Updated 11 months ago
- PowerShell Obfuscation and Data Science☆177Updated 3 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆264Updated last year