Updated version of the 2010 KoreLogic password cracking rules for John the Ripper
☆63Sep 27, 2012Updated 13 years ago
Alternatives and similar repositories for KoreLogic-Rules
Users that are interested in KoreLogic-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- A collection of tools used for researching passwords☆19Dec 17, 2024Updated last year
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- Solo Man Addon☆10Aug 31, 2015Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆59May 1, 2019Updated 6 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- ☆57Aug 7, 2020Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- stm8 ida processor module☆13Nov 9, 2021Updated 4 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- A quick python script to analyze a given set of passwords and give you some statistics. Used for identifying the most effective hashcat r…☆18Aug 24, 2017Updated 8 years ago
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- Fork of ReactOS (Cmd.exe), IRTriage Command Line Interpreter☆19Jun 4, 2018Updated 7 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Net::TNS, a Ruby library for connecting to Oracle databases.☆35May 7, 2019Updated 6 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago