KMGbully / ikebrute
Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with psk-crack using a wordlist mangled with john and hobo64.rule
☆10Updated 7 years ago
Alternatives and similar repositories for ikebrute:
Users that are interested in ikebrute are comparing it to the libraries listed below
- ☆17Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 6 years ago
- ☆16Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Small scripts to assist in pentesting☆19Updated 3 years ago
- Weapons Training for the Empire Workshop☆13Updated 6 years ago
- ☆20Updated 5 years ago
- Windows Privesc Check☆20Updated 10 years ago
- A Pythonic wrapper to MassDNS☆24Updated 6 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- ☆19Updated 7 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- ☆13Updated 8 years ago
- Automating those tasks which can or should be automated☆61Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago