Unic0rn28 / hashcat-rules
☆75Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for hashcat-rules
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆78Updated 3 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆30Updated 3 weeks ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆111Updated 11 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆81Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 4 months ago
- Updated version of n0kovo's Rule List☆24Updated 2 weeks ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆92Updated 3 months ago
- Generate graphs and charts based on password cracking result☆154Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆88Updated 3 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated last month
- Windows priviledge escalation script☆13Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆94Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆144Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 4 months ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆45Updated last year
- linikatz is a tool to attack AD on UNIX☆138Updated last year
- Various wordlists☆52Updated 6 months ago
- ☆53Updated last year
- Automate Scoping, OSINT and Recon assessments.☆92Updated 2 months ago
- Script to perform some hashcracking logic automagically☆66Updated 6 months ago
- A collection of tools that I use in CTF's or for assessments☆59Updated last month
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 10 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆73Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆54Updated last month
- A solution to create obfuscated reverse shells for PowerShell.☆68Updated 2 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆28Updated 4 months ago
- Ping-based Information Lookup and Outbound Transfer☆75Updated 7 months ago
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆29Updated 4 months ago