A tool to Terraform and automate password cracking on AWS.
☆85Nov 13, 2019Updated 6 years ago
Alternatives and similar repositories for Rook
Users that are interested in Rook are comparing it to the libraries listed below
Sorting:
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- SIP Tools☆14Sep 15, 2016Updated 9 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- ☆71Nov 20, 2020Updated 5 years ago
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Script to output stats around weak passwords and password re-use from an NtdsAudit (pwdump) file☆62Jun 9, 2021Updated 4 years ago
- Clone running process with ZwCreateProcess☆59Nov 8, 2020Updated 5 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- ☆71Sep 17, 2020Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Convert MacOS plist password file to hash file for password crackers☆37Dec 3, 2018Updated 7 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Mar 10, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Feb 6, 2019Updated 7 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Mar 16, 2023Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Crack passwords using Terraform and AWS☆43Mar 20, 2019Updated 6 years ago
- ☆23Mar 9, 2022Updated 3 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 5 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- ☆10Nov 24, 2018Updated 7 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago