ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆111Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆67Updated 9 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- Upload files done during my research.☆165Updated 5 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Automate converting webshells into reverse shells.☆70Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 6 months ago
- ☆52Updated 2 years ago
- Vast.ai Password Kracking☆85Updated 3 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- ☆47Updated 7 months ago
- External Playbooks for Public Access☆39Updated 7 months ago
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆161Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- OSCP Study Guide☆40Updated 2 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 6 months ago
- A public, open source physical security methodology☆46Updated last year
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆20Updated 4 months ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago