TepidJesus / CloudCrackLinks
[RELEASED] A CLI tool for large-scale password recovery operations using AWS
☆29Updated 2 years ago
Alternatives and similar repositories for CloudCrack
Users that are interested in CloudCrack are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- Collection of hashcat lists and things.☆50Updated 5 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆103Updated 8 months ago
- Windows priviledge escalation script☆13Updated 6 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated 10 months ago
- ☆42Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- ☆26Updated 2 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆81Updated 3 months ago
- ☆78Updated last year
- Gather information from an email address connected to Office 365☆84Updated 2 years ago
- Wappalyzer CLI tool to find Web Technologies☆60Updated last year
- Legba recipes.☆50Updated last year
- Script to perform some hashcracking logic automagically☆73Updated this week
- Windows Remote Administration Tool that uses Discord as C2☆30Updated 3 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆56Updated 4 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 2 months ago
- ☆23Updated 4 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 6 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Various wordlists☆66Updated 8 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆109Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆72Updated last year