blacktraffic / hashcrackLinks
Guesses hash types, picks some sensible dictionaries and rules for hashcat
☆31Updated 5 months ago
Alternatives and similar repositories for hashcrack
Users that are interested in hashcrack are comparing it to the libraries listed below
Sorting:
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆84Updated 8 months ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- Simple parser framework.☆26Updated 2 years ago
- ☆140Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 8 months ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 6 years ago
- ☆38Updated 5 months ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- ☆169Updated 5 years ago
- An Insider Threat Toolkit☆152Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆95Updated 3 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆172Updated 6 years ago
- ☆150Updated last year
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆140Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆179Updated last year
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆119Updated 5 years ago
- Domain user enumeration tool☆215Updated last year
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- Responsive Command and Control System☆104Updated 2 years ago
- DeepSea Phishing Gear☆122Updated 5 years ago
- Fake User Generator for Active Directory Environments☆158Updated 6 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago