CrackerJack / Hashcat Web Interface / Context Information Security
☆380Feb 1, 2024Updated 2 years ago
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- CrackQ: A Python Hashcat cracking queue system☆939Sep 3, 2024Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆236Feb 15, 2021Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆867Mar 20, 2023Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆495Apr 1, 2021Updated 4 years ago
- Pull secrets from an AWS environment☆67Feb 2, 2020Updated 6 years ago
- Overlord - Red Teaming Infrastructure Automation☆630May 28, 2024Updated last year
- Kraker is a distributed password brute-force system that focused on easy use.☆83Jun 8, 2025Updated 9 months ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆460Sep 2, 2024Updated last year
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆368Jun 24, 2025Updated 8 months ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- ☆297Jul 2, 2024Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆444Aug 18, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- ☆181Feb 3, 2021Updated 5 years ago
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆2,243Feb 25, 2023Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆449Nov 2, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- A WLAN red team framework.☆157Feb 9, 2026Updated last month
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Jun 8, 2021Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated last month
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆828Aug 8, 2023Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆293May 2, 2024Updated last year
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,756Feb 27, 2026Updated 3 weeks ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆270Mar 18, 2021Updated 5 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago