Anonymize your hashcat formatted files for online cracking
☆31Oct 27, 2024Updated last year
Alternatives and similar repositories for hashonymize
Users that are interested in hashonymize are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆24Dec 16, 2020Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- .NET 4.0 Project to interact with video, audio and keyboard hardware.☆219Sep 27, 2019Updated 6 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- ☆13Jul 30, 2021Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- A BOF for lazy people☆23Apr 4, 2024Updated last year
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆386Oct 27, 2024Updated last year
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- CVE-2020-5837 exploit☆42May 13, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- ☆16May 20, 2022Updated 3 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- ☆66Dec 24, 2021Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆12Nov 19, 2018Updated 7 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 5 years ago