bitcrackcyber / rurasortLinks
RuraSort - A utility to sort and streamline wordlists.
☆28Updated 5 years ago
Alternatives and similar repositories for rurasort
Users that are interested in rurasort are comparing it to the libraries listed below
Sorting:
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- A collection of hashcat-hcstat files☆33Updated 7 years ago
- A ton of helpful tools☆39Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆62Updated 13 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆91Updated last year
- Easy 802.1Q VLAN Hopping☆80Updated last year
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆69Updated 7 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- tools for analyzing strings from password lists☆59Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38Updated 6 years ago
- ☆81Updated 5 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆63Updated 12 years ago
- ☆33Updated 3 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆37Updated 3 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Updated 8 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 5 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Basic Auth Phish page☆25Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- The documents☆56Updated 7 years ago
- Oracle Attacks Tool☆13Updated 9 years ago