ShawnDEvans / panalyzer
Password list character frequency analyzer that can output hashcat masks
☆17Updated 5 years ago
Alternatives and similar repositories for panalyzer:
Users that are interested in panalyzer are comparing it to the libraries listed below
- OCL Hashcat username to decrypted password recombiner☆15Updated 9 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆32Updated 5 years ago
- MS17-010☆12Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Assists in mass exportation of Nessus scans☆19Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 3 months ago
- Useful Windows and AD tools☆15Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- ☆22Updated 4 years ago
- Random Tips and Writeups.☆13Updated 6 years ago