ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆111Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆66Updated 7 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆93Updated 11 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- The most average C2 ever (MACE)☆96Updated 3 years ago
- Automate converting webshells into reverse shells.☆69Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 5 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆61Updated 10 months ago
- ☆44Updated 4 years ago
- A public, open source physical security methodology☆46Updated last year
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- Upload files done during my research.☆163Updated 3 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated 2 years ago
- ☆85Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆32Updated 4 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 4 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆19Updated 2 months ago
- C2 Automation using Linode☆82Updated 2 years ago
- ☆45Updated 5 months ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- Offensive Lua.☆188Updated last year
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- ☆48Updated last year