ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆111Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆69Updated 10 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Automate converting webshells into reverse shells.☆70Updated this week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆112Updated 2 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆175Updated 5 months ago
- Upload files done during my research.☆165Updated 6 months ago
- ☆51Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- The most average C2 ever (MACE)☆96Updated 3 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- Basic reverse shell in C using socket() with complete explanation☆66Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- A public, open source physical security methodology☆46Updated last year
- ☆86Updated 2 months ago
- ☆84Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆98Updated last month
- ☆48Updated 8 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago