commonexploits / sonijohn
Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper
☆23Updated 10 years ago
Alternatives and similar repositories for sonijohn:
Users that are interested in sonijohn are comparing it to the libraries listed below
- Find a useable IP address to use☆29Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Basic Auth Phish page☆25Updated 7 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆27Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆31Updated 10 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- ☆47Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago