bitcrackcyber / rurasortLinks
RuraSort - A utility to sort and streamline wordlists.
☆28Updated 5 years ago
Alternatives and similar repositories for rurasort
Users that are interested in rurasort are comparing it to the libraries listed below
Sorting:
- A collection of hashcat-hcstat files☆33Updated 7 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆69Updated 7 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- ☆33Updated 3 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 8 years ago
- A ton of helpful tools☆39Updated 3 years ago
- Easy 802.1Q VLAN Hopping☆80Updated last year
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 6 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Offensive Data Storage☆61Updated 9 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 8 years ago
- tools for analyzing strings from password lists☆59Updated 3 years ago
- Search public IP owner through ARIN☆59Updated 4 months ago
- Open Source - Common Findings DataBase (JSON & MD)☆68Updated 3 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- ☆17Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Bash Bunny fun!☆52Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago