hashpwn / rulesLinks
Top hashpwn rules
☆21Updated last month
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated 2 years ago
- Nemesis agent for Mythic☆28Updated last month
- CVE-2013-4786 Go exploitation tool☆40Updated 2 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- ☆42Updated 8 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Updated 11 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- F5 Service Password Decryption☆29Updated 6 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- ☆14Updated 2 years ago
- POC tool to abuse windows server failover clusters☆53Updated 6 months ago
- A service container for interacting with SRA's VECTR☆15Updated 9 months ago
- ☆17Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 10 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 11 months ago
- A simple to use single-include Windows API resolver☆23Updated last year
- Powershell and python utilties for Entra Connect☆25Updated 8 months ago
- Find Inbound Email Domains☆35Updated 2 years ago