My Password Cracking Methodology
☆82Feb 11, 2023Updated 3 years ago
Alternatives and similar repositories for PasswordCrackingMethodology
Users that are interested in PasswordCrackingMethodology are comparing it to the libraries listed below
Sorting:
- My thoughts from going through the OSEP materials.☆20Jan 8, 2021Updated 5 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated last year
- Simple script to generate commands to achieve reverse shells.☆120Dec 14, 2020Updated 5 years ago
- ☆430Nov 28, 2020Updated 5 years ago
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- PE file mapping and manipulation package.☆36May 6, 2022Updated 3 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- Windows Forensics Salt States☆21Updated this week
- POC script for the ManageEngine Multiple Products Authenticated File Upload Exploit☆13Jun 26, 2017Updated 8 years ago
- SqlServer Linked Password Dumper.☆16Apr 28, 2017Updated 8 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Environments for lazy load commands and speed up start up time of zsh☆17Jun 26, 2019Updated 6 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- ☆18Jun 18, 2021Updated 4 years ago
- Simple tool to check command injection in headers of http request☆18Aug 12, 2022Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- Cryptocurrency Discovery and Triage Tool - Identify multiple cryptocurrency addresses and transactions from various wallet applications!☆19Feb 12, 2026Updated 3 weeks ago
- ☆41Jan 19, 2023Updated 3 years ago
- In-depth ldap enumeration utility☆564Updated this week
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆22Aug 13, 2018Updated 7 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…