cyclone-github / rulesLinks
Custom rules by cyclone
☆16Updated 3 weeks ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- Script to perform some hashcracking logic automagically☆80Updated last month
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated last month
- Legba recipes.☆51Updated last year
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆26Updated 3 weeks ago
- Collection of hashcat lists and things.☆51Updated 6 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Updated last year
- Extract credentials and other useful info from network captures☆75Updated 3 years ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆42Updated last year
- hashgen - the blazingly fast hash generator☆39Updated 3 weeks ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 10 months ago
- ☆23Updated 5 years ago
- Top hashpwn rules☆20Updated 3 weeks ago
- A little cheatsheet for NetExec☆32Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated last week
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆59Updated 11 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆26Updated 3 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 4 months ago
- Various wordlists☆71Updated 3 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- Ready to go Phishing Platform☆57Updated last year
- masscan with exclusive excludes☆58Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆56Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆46Updated last year