foreni-packages / rcracki_mtLinks
rcracki_mt : used to perform a rainbow table attack on password hashes
☆13Updated 9 years ago
Alternatives and similar repositories for rcracki_mt
Users that are interested in rcracki_mt are comparing it to the libraries listed below
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- Noob Penetration tester☆11Updated last year
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- ☆19Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 7 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 5 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 9 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- ☆22Updated 3 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- Wordlist generator☆16Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago