ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆112Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- Upload files done during my research.☆168Updated 3 weeks ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated 8 months ago
- Basic reverse shell in C using socket() with complete explanation☆68Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- A public, open source physical security methodology☆47Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Updated 4 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆121Updated 2 months ago
- Automate converting webshells into reverse shells.☆71Updated 3 weeks ago
- ☆51Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆92Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 10 months ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Updated 3 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 9 months ago