CrackQ: A Python Hashcat cracking queue system
☆939Sep 3, 2024Updated last year
Alternatives and similar repositories for crackq
Users that are interested in crackq are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CrackerJack / Hashcat Web Interface / Context Information Security☆380Feb 1, 2024Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,810Updated this week
- Overlord - Red Teaming Infrastructure Automation☆630May 28, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆880Mar 29, 2021Updated 4 years ago
- A mostly-serverless distributed hash cracking platform☆822Apr 6, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,452Dec 18, 2022Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆305Jun 14, 2024Updated last year
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,608Jul 10, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,279Mar 8, 2026Updated 2 weeks ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,579Jan 5, 2021Updated 5 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,756Feb 27, 2026Updated 3 weeks ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Hashtopolis - distributed password cracking with Hashcat☆1,725Updated this week
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Extract credentials from lsass remotely☆2,184Dec 24, 2025Updated 2 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,441Mar 2, 2026Updated 3 weeks ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆2,243Feb 25, 2023Updated 3 years ago
- A tool that implements the Golden SAML attack☆341Oct 15, 2018Updated 7 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,735Jan 16, 2026Updated 2 months ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆373Oct 30, 2020Updated 5 years ago
- A web front-end for password cracking and analytics☆387Feb 17, 2026Updated last month
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,649Oct 11, 2018Updated 7 years ago
- Mimikatz implementation in pure Python☆3,257Jan 2, 2026Updated 2 months ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- large hashcat rulesets generated from real-world compromised passwords☆400Nov 26, 2020Updated 5 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆745Jul 29, 2025Updated 7 months ago