A guide and tool for cracking ssh known_hosts files with hashcat
☆340Jan 3, 2024Updated 2 years ago
Alternatives and similar repositories for known_hosts-hashcat
Users that are interested in known_hosts-hashcat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Collection of hashcat lists and things.☆50Dec 18, 2019Updated 6 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- UAC bypass, Elevate, Persistence methods☆2,738Feb 13, 2023Updated 3 years ago
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 7 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- Hashcat Bash Scripts for bulk hash file processing☆52Jul 2, 2016Updated 9 years ago
- large hashcat rulesets generated from real-world compromised passwords☆399Nov 26, 2020Updated 5 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,316Nov 22, 2022Updated 3 years ago
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- Run PowerShell command without invoking powershell.exe☆1,538Mar 23, 2023Updated 3 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- NTLMv1 Multitool☆661Mar 12, 2026Updated 2 weeks ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Modern tactical exploitation toolkit.☆860Mar 9, 2026Updated 3 weeks ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆1,053Feb 27, 2026Updated last month
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- https://hackaday.io/project/20039-pocket-thermal-camera☆14Sep 11, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 5 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,812Mar 20, 2026Updated last week
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 4 years ago