ctxis / crackerjack
CrackerJack / Hashcat Web Interface / Context Information Security
☆357Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for crackerjack
- Zero Infrastructure Password Cracking☆393Updated 2 months ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- A web front-end for password cracking and analytics☆360Updated this week
- Network Pivoting Toolkit☆435Updated last year
- A WLAN red team framework.☆142Updated last month
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆298Updated 5 months ago
- large hashcat rulesets generated from real-world compromised passwords☆390Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆192Updated 2 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆365Updated 11 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆466Updated 4 months ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆317Updated last year
- Red Team PowerShell Script☆325Updated last year
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆329Updated 5 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.☆753Updated 4 years ago
- Hashcat web interface☆291Updated 11 months ago
- A polyglot payload generator☆239Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆635Updated last year
- zerosum0x0's Koadic☆268Updated 2 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆373Updated 3 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆147Updated 4 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago
- ☆147Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated 3 weeks ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆117Updated 4 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆316Updated 4 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆405Updated 2 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆291Updated last year
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆263Updated last year
- Evil client portion of EAP relay attack☆191Updated last year