hashstation / zip2hashcatLinks
☆25Updated 3 months ago
Alternatives and similar repositories for zip2hashcat
Users that are interested in zip2hashcat are comparing it to the libraries listed below
Sorting:
- ☆73Updated 3 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆123Updated 2 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆149Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆283Updated 5 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆124Updated 5 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated 6 months ago
- WAV to MMV converter. You can then use the MMV file in input of MSSTV to decode Slow Scan Television (SSTV) sound signals.☆18Updated 4 months ago
- Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.☆135Updated last year
- A reverse shell for Windows and Linux written in C.☆76Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆126Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆287Updated 3 weeks ago
- A webshell plugin and interactive shell for pentesting a Joomla website.☆53Updated 3 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆155Updated 2 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆130Updated 2 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆209Updated 8 months ago
- Bruteforce Keepass databases (KDBX 4.x format)☆98Updated 11 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆365Updated last year
- Memory mapping profiles for forensic analysis using volatility 2☆48Updated 2 years ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆351Updated 2 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆98Updated 6 months ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆150Updated 3 years ago
- generate payloads that force authentication against an attacker machine☆107Updated 2 years ago
- A tool for mapping cypher databases☆17Updated 2 years ago
- ☆148Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆54Updated this week
- Make everyone in your VLAN ASRep roastable☆199Updated 4 months ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆112Updated last year
- KeePass 2.X dumper (CVE-2023-32784)☆20Updated last year
- Python utility that generates "imageless" QR codes in various formats☆124Updated 10 months ago
- ☆141Updated 2 years ago