Generate a report with charts and statistics about cracked passwords in XLSX format
☆36Dec 4, 2025Updated 3 months ago
Alternatives and similar repositories for kraken
Users that are interested in kraken are comparing it to the libraries listed below
Sorting:
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- ☆11Dec 22, 2020Updated 5 years ago
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 5 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- A web application testing tool built for capturing and modifying http/https requests.☆16Oct 15, 2025Updated 4 months ago
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Feb 25, 2026Updated last week
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- The GUI is built on top of the osmo-nitb-scripts-calypsobts OR osmo-nitb-scripts software packages, which are used to configure and opera…☆22May 1, 2024Updated last year
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- CIS Microsoft 365 Foundations Benchmark v5.0.0 - Automated Compliance Checker☆46Updated this week
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- [USENIX Security 24] Cloud-hosted proxies/VPNs with minimal cost and maximum circumvention utility☆23Feb 21, 2025Updated last year
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆189Nov 19, 2025Updated 3 months ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.☆20Nov 10, 2025Updated 3 months ago
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆148Dec 21, 2025Updated 2 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 8 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Force target victim to unsafe network☆31Jun 6, 2025Updated 8 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated 3 weeks ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- Click Once + App Domain☆64Feb 23, 2026Updated last week
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- NCSA Mosaic 2.7☆24Jul 21, 2023Updated 2 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- Unescape strings with escape sequences written out as literal characters.☆26Jan 19, 2026Updated last month