ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆112Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆72Updated last year
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- Upload files done during my research.☆167Updated this week
- ☆44Updated 4 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- ☆51Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 9 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- This is practice VM for malware development☆169Updated 3 weeks ago
- Automate converting webshells into reverse shells.☆71Updated this week
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 3 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- ☆84Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆92Updated last month
- C2 Automation using Linode☆85Updated 3 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 6 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆101Updated 3 months ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆21Updated 7 months ago
- Creating a ransomware in a minute☆30Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago