evilmog / hashcat-hcstatLinks
A collection of hashcat-hcstat files
☆31Updated 7 years ago
Alternatives and similar repositories for hashcat-hcstat
Users that are interested in hashcat-hcstat are comparing it to the libraries listed below
Sorting:
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆71Updated 8 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Updated 4 years ago
- ☆19Updated 8 years ago
- tools for analyzing strings from password lists☆59Updated 2 years ago
- Automated enumeration☆30Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- ☆83Updated 9 years ago
- Offensive Data Storage☆60Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Collection of rules and debug data for hashcat☆19Updated 7 years ago
- Automatically performs the SMB relay attack☆72Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- ☆58Updated 7 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆52Updated 6 years ago
- A web interface for Hashcat/oclHashcat☆28Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆69Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 10 months ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- A sample bot for Cobalt Strike 3☆22Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- meterpreter connetion☆22Updated 7 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆55Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago