JoelGMSec / Cloudtopolis
Zero Infrastructure Password Cracking
☆393Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for Cloudtopolis
- large hashcat rulesets generated from real-world compromised passwords☆389Updated 3 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆357Updated 9 months ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆361Updated 6 months ago
- A web front-end for password cracking and analytics☆360Updated 2 months ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆298Updated 4 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- Username enumeration and password spraying tool aimed at Microsoft O365.☆763Updated this week
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆290Updated last year
- Rule for hashcat or john. Aiming to crack how people generate their password☆404Updated 2 months ago
- Automatic Service Enumeration Script☆219Updated 2 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆211Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆753Updated 4 years ago
- A polyglot payload generator☆239Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆434Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆968Updated 2 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆465Updated 4 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆329Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆192Updated 2 years ago
- A WLAN red team framework.☆141Updated last month
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆306Updated 2 weeks ago
- Simple & Powerful PowerShell Script Obfuscator☆454Updated last year
- ☆147Updated last year
- Hiding GoPhish from the boys in blue☆171Updated last year
- Simple & Customizable DNS Data Exfiltrator☆106Updated last year
- Maximizing BloodHound. Max is a good boy.☆501Updated 2 months ago
- An Office365 User Attack Tool☆621Updated 7 months ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆269Updated last month
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆197Updated 3 years ago