JumpsecLabs / Rook
A tool to Terraform and automate password cracking on AWS.
☆81Updated 5 years ago
Alternatives and similar repositories for Rook:
Users that are interested in Rook are comparing it to the libraries listed below
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- ☄️ go-out - A Golang egress buster.☆123Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆62Updated 11 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- A PowerShell script for performing a build review of a Windows host☆23Updated 5 years ago
- ☆77Updated 5 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆181Updated last year
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆81Updated last month
- A VS Code extension to preview XML nmap output☆44Updated 11 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆85Updated 7 months ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Uses Core's Impacket Library to get the password policy from a windows machine☆34Updated 2 months ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆34Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆69Updated 11 months ago
- Detect & filter duplicate hashcat rules☆41Updated this week
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- ☆36Updated last week
- easy-to-use payload hosting☆264Updated 2 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆107Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- Various scripts and codes☆83Updated 3 years ago
- Resolves an IP address to the cloud provider it is hosted on☆92Updated 3 weeks ago
- ☆68Updated 3 years ago
- ☆21Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 4 months ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 7 years ago