J3rryBl4nks / PasswordCrackingMethodologyView external linksLinks
My Password Cracking Methodology
☆82Feb 11, 2023Updated 3 years ago
Alternatives and similar repositories for PasswordCrackingMethodology
Users that are interested in PasswordCrackingMethodology are comparing it to the libraries listed below
Sorting:
- My thoughts from going through the OSEP materials.☆20Jan 8, 2021Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆39Aug 4, 2024Updated last year
- Assorted Cereals☆10Nov 13, 2021Updated 4 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated last year
- ☆14Nov 15, 2020Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆120Dec 14, 2020Updated 5 years ago
- ☆431Nov 28, 2020Updated 5 years ago
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- PE file mapping and manipulation package.☆36May 6, 2022Updated 3 years ago
- Python script to launch burp scans automatically☆33Jul 18, 2021Updated 4 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 3 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Windows Forensics Salt States☆20Feb 7, 2026Updated last week
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 4 months ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Environments for lazy load commands and speed up start up time of zsh☆17Jun 26, 2019Updated 6 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- ☆18Jun 18, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 4 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- Cryptocurrency Discovery and Triage Tool - Identify multiple cryptocurrency addresses and transactions from various wallet applications!☆19Feb 3, 2026Updated last week
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆22Aug 13, 2018Updated 7 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Oct 31, 2018Updated 7 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86May 5, 2023Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,598Dec 9, 2021Updated 4 years ago