MXall0c / caulderaLinks
Distillations and expansions on Rocktastic12a
☆14Updated 3 years ago
Alternatives and similar repositories for cauldera
Users that are interested in cauldera are comparing it to the libraries listed below
Sorting:
- Random Hashcat Scrips☆32Updated 11 months ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Detect & filter duplicate hashcat rules☆46Updated 8 months ago
- wordlists for password cracking☆28Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- ☆27Updated 5 years ago
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 4 years ago
- ☆16Updated 8 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- MimeCast Password Spraying Tool☆47Updated 5 years ago
- ☆17Updated 3 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆91Updated last year
- Easily serve HTTP and DNS keys for proper payload protection☆59Updated 6 years ago
- SMB Named Pipe shell☆69Updated 10 months ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆18Updated 6 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Updated last year
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42Updated 5 years ago
- Caesar-Cipher based encryption☆31Updated 4 years ago
- Helpful operator notes and techniques in actionable form☆17Updated 2 years ago
- Content from THOTCON 0xa talk☆10Updated 6 years ago
- ☆38Updated 8 months ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- ☆29Updated 8 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago