Orange-Cyberdefense / hashview
A web front-end for password cracking and analytics
☆16Updated 6 years ago
Alternatives and similar repositories for hashview:
Users that are interested in hashview are comparing it to the libraries listed below
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Hashes of infamous malware☆26Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- ☆33Updated 2 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆27Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A collection of personal ZAP scripts☆14Updated last year
- Sp00fer blog post -☆26Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- ☆36Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- Forensic Imaging quickstarts!☆14Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago