caeksec / rulesLinks
Updated version of n0kovo's Rule List
☆37Updated 5 months ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Updated 11 months ago
- pysnaffler☆104Updated last month
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- ☆107Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Parses Snaffler output file and generate beautified outputs.☆107Updated 8 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 2 months ago
- The CAPTCHA-resilient contact scraper.☆26Updated last year
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆31Updated 3 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 3 weeks ago
- Efflanrs - GUI for Snaffler Output☆27Updated last year
- sturdy-chainsaw☆65Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆204Updated 4 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆36Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 11 months ago
- ☆113Updated 4 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Custom queries list for BloodHound☆30Updated 3 months ago
- Python utility that generates "imageless" QR codes in various formats☆129Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆73Updated 6 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆131Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆46Updated 2 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆115Updated 9 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆84Updated last month
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 8 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Updated last year
- Modular Enumeration and Password Spraying Framework☆126Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 10 months ago