blacktraffic / hashcrackLinks
Guesses hash types, picks some sensible dictionaries and rules for hashcat
☆31Updated 11 months ago
Alternatives and similar repositories for hashcrack
Users that are interested in hashcrack are comparing it to the libraries listed below
Sorting:
- Simple parser framework.☆26Updated 2 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 4 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Updated last year
- Reconnaissance tool for Microsoft Office 365☆69Updated 7 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 5 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- Microsoft External Attack Tool☆178Updated 3 years ago
- ☆140Updated 6 years ago
- An Insider Threat Toolkit☆155Updated 7 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆122Updated 6 years ago
- A Django application to help red team operators manage a library of domain names☆167Updated 2 years ago
- Domain user enumeration tool☆214Updated 2 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- ☆167Updated 5 years ago
- Fake User Generator for Active Directory Environments☆158Updated 7 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Updated 6 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Updated 7 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Resources for our Active Directory security workshops☆140Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Updated 3 years ago
- Various Cheat Sheets☆183Updated 4 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Updated 6 months ago
- ☆54Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago