ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆112Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆101Updated 5 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 2 months ago
- Automate converting webshells into reverse shells.☆72Updated last week
- Upload files done during my research.☆169Updated last month
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- A collection of tools that I use in CTF's or for assessments☆107Updated 11 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆53Updated 10 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 3 years ago
- Materials from different CTFs for later reuse☆27Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆68Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- ☆85Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 9 months ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- ☆94Updated last month
- A public, open source physical security methodology☆47Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 11 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago