Converts the output from Invoke-Kerberoast into hashcat format.
☆33Nov 13, 2018Updated 7 years ago
Alternatives and similar repositories for Convert-Invoke-Kerberoast
Users that are interested in Convert-Invoke-Kerberoast are comparing it to the libraries listed below
Sorting:
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Cobalt Strike Aggressor Scripts☆30Apr 15, 2017Updated 8 years ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Oct 26, 2023Updated 2 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- ☆18Feb 15, 2020Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Mar 31, 2018Updated 7 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- ☆41May 16, 2018Updated 7 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Cisco IOS SNMP RCE PoC☆253Jan 6, 2018Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆29Dec 7, 2019Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago