iamaldi / grafana2hashcatLinks
Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.
☆25Updated 4 years ago
Alternatives and similar repositories for grafana2hashcat
Users that are interested in grafana2hashcat are comparing it to the libraries listed below
Sorting:
- Joomla login bruteforce☆93Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- Bruteforce Keepass databases (KDBX 4.x format)☆122Updated last year
- Aspx reverse shell☆118Updated 5 years ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆115Updated 7 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆213Updated 8 months ago
- Kerberoast with ACL abuse capabilities☆581Updated 11 months ago
- SSTI Payload Generator☆92Updated 3 years ago
- Root shell PoC for CVE-2021-3156☆71Updated 4 years ago
- TUDO - A vulnerable PHP Web Application☆123Updated 2 years ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆57Updated 2 years ago
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Updated 6 years ago
- Pentesting Apache Tomcat 101☆15Updated 2 years ago
- Squid Pivoting Open Port Scanner☆89Updated 11 months ago
- GameOver(lay) Ubuntu Privilege Escalation☆130Updated 2 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆102Updated 4 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆344Updated last year
- Ad hoc collection of Red Teaming & Active Directory tooling.☆222Updated 2 years ago
- ☆169Updated 2 years ago
- A wordlist repository with human-curated and reviewed content.☆119Updated 2 years ago
- ☆125Updated 3 years ago
- LimeSurvey Authenticated RCE☆24Updated 2 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆99Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆63Updated 3 years ago
- Enumerate / Dump Docker Registry☆180Updated last year
- Aliases and scripts to make common tasks easier.☆163Updated last year
- Get a reverse shell using PostgreSQL☆20Updated last year
- A cheatsheet for NetExec☆157Updated 5 months ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆20Updated 2 years ago