SpiderLabs / KoreLogic-Rules
Updated version of the 2010 KoreLogic password cracking rules for John the Ripper
☆61Updated 12 years ago
Alternatives and similar repositories for KoreLogic-Rules:
Users that are interested in KoreLogic-Rules are comparing it to the libraries listed below
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- A collection of hashcat-hcstat files☆30Updated 7 years ago
- Small scripts to assist in pentesting☆19Updated 4 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- OCL Hashcat username to decrypted password recombiner☆15Updated 9 years ago
- Basic Auth Phish page☆25Updated 7 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 8 years ago
- Collection of rules and debug data for hashcat☆18Updated 7 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆71Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- ☆19Updated 7 years ago
- ☆25Updated 8 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆11Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- Random Hashcat Scrips☆27Updated 5 months ago
- Send mail with handlebars like templates☆25Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆32Updated 5 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Find a useable IP address to use☆29Updated 10 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Updated 7 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- MacroSploit is a modified version of unicorn used to generate a social engineering Microsoft Office macro payload for penetration testers…☆8Updated 9 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago