chris408 / known_hosts-hashcatView external linksLinks
A guide and tool for cracking ssh known_hosts files with hashcat
☆339Jan 3, 2024Updated 2 years ago
Alternatives and similar repositories for known_hosts-hashcat
Users that are interested in known_hosts-hashcat are comparing it to the libraries listed below
Sorting:
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- ☆98Feb 21, 2019Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- UAC bypass, Elevate, Persistence methods☆2,736Feb 13, 2023Updated 3 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- Collection of hashcat lists and things.☆50Dec 18, 2019Updated 6 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Feb 10, 2021Updated 5 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Oct 22, 2016Updated 9 years ago
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Modern tactical exploitation toolkit.☆857Nov 8, 2025Updated 3 months ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Apr 6, 2021Updated 4 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,308Nov 22, 2022Updated 3 years ago
- singe's grep - a fast grep using single-file parallelism☆47Oct 29, 2022Updated 3 years ago
- NTLMv1 Multitool☆662Nov 30, 2025Updated 2 months ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 2 months ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆654Jan 6, 2022Updated 4 years ago
- https://hackaday.io/project/20039-pocket-thermal-camera☆14Sep 11, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Aug 27, 2018Updated 7 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆141Mar 10, 2021Updated 4 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Aug 7, 2020Updated 5 years ago