hashpwn / rules
Top hashpwn rules
☆19Updated 5 months ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- Nemesis agent for Mythic☆27Updated 8 months ago
- ☆30Updated last week
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated last week
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 6 months ago
- ☆17Updated 4 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- ☆18Updated last year
- Simple reverse ICMP shell☆14Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 2 months ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 2 months ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆30Updated 2 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 weeks ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 6 months ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Passworld is a fully customizable wordlist generator☆15Updated 8 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 2 months ago
- ☆15Updated 10 months ago
- ☆17Updated 7 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago