ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆113Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 11 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 8 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- Upload files done during my research.☆166Updated 7 months ago
- A public, open source physical security methodology☆46Updated last year
- ☆90Updated last month
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Updated 6 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- This is practice VM for malware development☆134Updated 2 weeks ago
- Artifact monitoring that ensures fairplay☆78Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 7 months ago
- linikatz is a tool to attack AD on UNIX☆149Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- ☆51Updated 9 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆57Updated 3 years ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆114Updated 3 months ago
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- Automate converting webshells into reverse shells.☆71Updated last week
- ☆84Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Easy red team phishing with Puppeteer☆132Updated 2 years ago