caeksec / rulesLinks
Updated version of n0kovo's Rule List
☆44Updated last week
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 2 months ago
- ☆118Updated 3 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- pysnaffler☆110Updated last month
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Parses Snaffler output file and generate beautified outputs.☆132Updated last month
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Updated last month
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆28Updated 4 months ago
- Efflanrs - GUI for Snaffler Output☆27Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆119Updated 6 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆137Updated 2 years ago
- Python utility that generates "imageless" QR codes in various formats☆136Updated last year
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated 6 months ago
- sturdy-chainsaw☆69Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Updated last week
- ☆120Updated 8 months ago
- ☆198Updated last week
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆137Updated 3 weeks ago
- Malware As A Service☆137Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- ☆25Updated 4 months ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- ☆25Updated 3 years ago
- Custom queries list for BloodHound☆31Updated 6 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Updated last year
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Updated last year
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- Make everyone in your VLAN ASRep roastable☆245Updated 3 months ago