ibnaleem / rulesLinks
Lastest Hashcat rules for password cracking
☆52Updated 2 weeks ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- ☆41Updated 5 months ago
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 8 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- fully async implementation of Dirkjan's ROADTools☆33Updated 8 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 2 months ago
- LinkedIn recon the easy way☆109Updated 4 months ago
- Living Off the Foreign Land setup scripts☆72Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆90Updated 4 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆109Updated 8 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 4 months ago
- ☆54Updated 10 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆35Updated 8 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated 11 months ago
- SMB Audit Tool you were looking for☆23Updated 2 years ago
- ☆29Updated 2 years ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Updated 2 weeks ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 8 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆57Updated 2 weeks ago
- ☆22Updated last month
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆57Updated 4 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆132Updated 3 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 5 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- Scripts that automate portions of pentests.☆55Updated 3 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 weeks ago