ignis-sec / Markopy
Markov Model libraries, optimized for cracking-focused password generations.
β109Updated 3 years ago
Related projects β
Alternatives and complementary repositories for Markopy
- Generate graphs and charts based on password cracking resultβ154Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD πβ89Updated 3 months ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.β179Updated last week
- this script will help you find favicon hashes which you can use to shodan to get more details about an assetβ27Updated 9 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be usedβ¦β130Updated this week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.β144Updated last year
- β50Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessmentsβ59Updated last month
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.β65Updated 8 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.β116Updated 2 weeks ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Labβ182Updated last year
- linikatz is a tool to attack AD on UNIXβ138Updated last year
- β32Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!β86Updated 2 weeks ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blockingβ112Updated 6 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to β¦β118Updated 7 months ago
- QuoteDB (Vulnerable TCP Server)β61Updated 11 months ago
- Some Useful Tricks for Pentest Android and iOS Appsβ61Updated 3 weeks ago
- Lena's scripts/code/resources for malware analysisβ25Updated 5 months ago
- Recon MindMap (RMM)β140Updated 5 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and othersβ77Updated last year
- Collection Of Reverse Shell that can easily generate using Python3β57Updated 9 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2β¦β83Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.β34Updated 4 months ago
- Check subdomains for subdomain takeovers and other DNS tomfooleryβ107Updated this week
- A compact guide to network pivoting for penetration testings / CTF challenges.β191Updated 4 months ago
- Everything and anything related to password sprayingβ126Updated 6 months ago
- External Playbooks for Public Accessβ31Updated 8 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find entβ¦β117Updated 2 years ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.β92Updated 3 months ago