JakeWnuk / ptt
Password Transformation Tool (ptt) is a versatile utility designed for password cracking.
☆19Updated this week
Related projects ⓘ
Alternatives and complementary repositories for ptt
- My rules☆15Updated this week
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆20Updated 10 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 6 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆27Updated 6 months ago
- Check robustness of your (their) Active Directory accounts passwords☆32Updated 7 months ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- ☆17Updated last year
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆13Updated this week
- Extract registry and NTDS secrets from local or remote disk images☆28Updated 2 months ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 8 months ago
- Ansible role that Installs Mythic☆14Updated 4 months ago
- Nemesis agent for Mythic☆24Updated 2 months ago
- Scripts to interact with Microsoft Graph APIs☆31Updated this week
- self-hosted Azure OSINT tool☆22Updated 2 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆11Updated 6 months ago
- Microsoft365 Device Code Phishing Framework☆34Updated 3 years ago
- Find Inbound Email Domains☆21Updated 10 months ago
- Passworld is a fully customizable wordlist generator☆14Updated last month
- ☆20Updated last month
- Smuggle a file to a user's browser☆18Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- ☆20Updated 9 months ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆16Updated 5 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆23Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 5 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago