cyclone-github / yescrypt_crackLinks
Yescrypt Hash Cracker
☆14Updated 3 weeks ago
Alternatives and similar repositories for yescrypt_crack
Users that are interested in yescrypt_crack are comparing it to the libraries listed below
Sorting:
- Top hashpwn rules☆21Updated last month
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 11 months ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Updated last month
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆28Updated 4 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Updated 2 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated 2 years ago
- Powershell and python utilties for Entra Connect☆25Updated 8 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆39Updated 3 weeks ago
- P2P Communications of Named Pipes☆12Updated last month
- ☆42Updated 8 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Updated 2 months ago
- Find Inbound Email Domains☆35Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆55Updated last month
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated 2 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Updated 11 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 10 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- ☆22Updated last month
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated last year
- top usernames from azure survey 2025☆14Updated 9 months ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆48Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago