A tool to Terraform and automate password cracking on AWS.
☆85Nov 13, 2019Updated 6 years ago
Alternatives and similar repositories for Rook
Users that are interested in Rook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SIP Tools☆14Sep 15, 2016Updated 9 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- ☆38Sep 14, 2020Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- ☆23Mar 9, 2022Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Script to output stats around weak passwords and password re-use from an NtdsAudit (pwdump) file☆62Jun 9, 2021Updated 4 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- Clone running process with ZwCreateProcess☆59Nov 8, 2020Updated 5 years ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- ☆71Nov 20, 2020Updated 5 years ago
- ☆71Sep 17, 2020Updated 5 years ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆79Oct 18, 2024Updated last year
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Mar 10, 2023Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- ☆12Aug 8, 2024Updated last year
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆191Dec 19, 2023Updated 2 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 5 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- Convert MacOS plist password file to hash file for password crackers☆37Dec 3, 2018Updated 7 years ago
- Some useful scripts I have written or collected☆82Jul 24, 2023Updated 2 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago