DES Rainbow Table Online Phase
☆24Aug 2, 2017Updated 8 years ago
Alternatives and similar repositories for desrtop
Users that are interested in desrtop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated last month
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- NTLMv1 Multitool☆661Mar 12, 2026Updated 2 weeks ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 11 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Feb 16, 2023Updated 3 years ago
- Bootstrapping setup for participants☆10Dec 29, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year
- ☆16Sep 23, 2021Updated 4 years ago
- Code snippets from my blog☆30Oct 13, 2025Updated 5 months ago
- ☆18Aug 19, 2021Updated 4 years ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆28Dec 22, 2024Updated last year
- ☆25Jul 7, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated 2 months ago
- An Arduino sketch for the Adafruit SCD4X and SCD-30 CO2 sensor running on an ESP32 with an http server.☆19May 31, 2025Updated 9 months ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Dumping LAPS from Python☆283Dec 7, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆225Aug 4, 2021Updated 4 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago