Unic0rn28 / hashcat-rules
☆71Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for hashcat-rules
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆30Updated last week
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆111Updated 10 months ago
- Updated version of n0kovo's Rule List☆24Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆75Updated 2 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆89Updated 3 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated 3 weeks ago
- Generate graphs and charts based on password cracking result☆153Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆93Updated 9 months ago
- Script to perform some hashcracking logic automagically☆62Updated 5 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆94Updated 5 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆122Updated last month
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆87Updated last week
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆81Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆71Updated last month
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆108Updated 9 months ago
- Various wordlists☆51Updated 6 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 3 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated last week
- PowerShell Obfuscator☆87Updated 5 months ago
- ☆77Updated 7 months ago
- ☆22Updated 8 months ago
- A Slack bot phishing framework for Red Teaming exercises☆156Updated 6 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆111Updated 5 months ago
- Everything and anything related to password spraying☆126Updated 5 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆105Updated this week
- Collection of hashcat lists and things.☆50Updated 4 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆86Updated last week
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated last week
- sturdy-chainsaw☆52Updated last year