iamaldi / grafana2hashcatLinks
Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.
☆24Updated 3 years ago
Alternatives and similar repositories for grafana2hashcat
Users that are interested in grafana2hashcat are comparing it to the libraries listed below
Sorting:
- Bruteforce Keepass databases (KDBX 4.x format)☆117Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆151Updated last year
- Joomla login bruteforce☆80Updated last year
- Aspx reverse shell☆114Updated 5 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆195Updated 6 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆105Updated 7 years ago
- Kerberoast with ACL abuse capabilities☆554Updated 9 months ago
- Root shell PoC for CVE-2021-3156☆69Updated 4 years ago
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Updated 6 years ago
- TUDO - A vulnerable PHP Web Application☆122Updated 2 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆98Updated 2 months ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- SSTI Payload Generator☆91Updated 3 years ago
- Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection☆40Updated last year
- Malicious Macro Generator for LibreOffice/OpenOffice☆45Updated 2 years ago
- Squid Pivoting Open Port Scanner☆84Updated 9 months ago
- Pentesting Apache Tomcat 101☆14Updated 2 years ago
- A Python tool to crack solar putty session backups☆22Updated 9 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆132Updated last week
- Ad hoc collection of Red Teaming & Active Directory tooling.☆216Updated 2 years ago
- Enumerate / Dump Docker Registry☆181Updated last year
- ☆122Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆61Updated 2 years ago
- Most of the notes, resources and scripts I used to prepare for the HTB CPTS and "pass it the 2 time."☆59Updated 2 years ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆122Updated 3 weeks ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆152Updated last year
- Get a reverse shell using PostgreSQL☆20Updated last year
- generate payloads that force authentication against an attacker machine☆110Updated 2 years ago
- ☆158Updated 2 years ago
- Local File Inclusion discovery and exploitation tool☆324Updated 8 months ago