Unic0rn28 / hashcat-rules
☆82Updated 2 years ago
Alternatives and similar repositories for hashcat-rules:
Users that are interested in hashcat-rules are comparing it to the libraries listed below
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆84Updated last month
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆95Updated 5 months ago
- ☆71Updated 8 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆130Updated 6 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆64Updated last year
- Script to perform some hashcracking logic automagically☆67Updated 8 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆31Updated 2 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆97Updated last year
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆115Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 6 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Windows priviledge escalation script☆13Updated last year
- Script to retrieve the master password of a keepass database <= 2.53.1☆95Updated 9 months ago
- A collection of tools that I use in CTF's or for assessments☆80Updated this week
- Living Off The Land (LOTL) persistent Reverse shell☆94Updated last year
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆83Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆49Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆92Updated last month
- Creating a Malicious Macro using MS Word☆18Updated 2 years ago
- Scripts for offensive security☆92Updated this week
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆82Updated last year
- sturdy-chainsaw☆52Updated last year
- ☆42Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆145Updated last month
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆67Updated 10 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆47Updated 2 weeks ago
- Various wordlists☆58Updated 3 weeks ago
- Automate Scoping, OSINT and Recon assessments.☆94Updated last week
- Some of my personal notes that helped me pass the OSWP☆49Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆153Updated 7 months ago