c6fc / npk
A mostly-serverless distributed hash cracking platform
☆564Updated 11 months ago
Alternatives and similar repositories for npk:
Users that are interested in npk are comparing it to the libraries listed below
- Username enumeration and password spraying tool aimed at Microsoft O365.☆825Updated 4 months ago
- large hashcat rulesets generated from real-world compromised passwords☆393Updated 4 years ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,137Updated 2 weeks ago
- A web front-end for password cracking and analytics☆368Updated last month
- Rule for hashcat or john. Aiming to crack how people generate their password☆430Updated 6 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,053Updated last week
- Infrastructure Automation☆341Updated 11 months ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,046Updated 2 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,098Updated 8 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆455Updated 5 months ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆745Updated 6 months ago
- Zero Infrastructure Password Cracking☆401Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆643Updated 3 months ago
- ☆661Updated last month
- Identify privilege escalation paths within and across different clouds☆682Updated 4 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,103Updated 10 months ago
- Maximizing BloodHound. Max is a good boy.☆507Updated last month
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆769Updated 2 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆958Updated last year
- An Office365 User Attack Tool☆632Updated last year
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆335Updated 6 years ago
- Pentest Report Generator☆397Updated last week
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆653Updated 3 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,116Updated 10 months ago
- Kerberoast attack -pure python-☆427Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆616Updated 9 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆487Updated 2 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆372Updated 4 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,026Updated 4 months ago