ignis-sec / MarkopyLinks
Markov Model libraries, optimized for cracking-focused password generations.
☆112Updated 4 years ago
Alternatives and similar repositories for Markopy
Users that are interested in Markopy are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- Automate converting webshells into reverse shells.☆72Updated 2 weeks ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆165Updated 2 years ago
- Upload files done during my research.☆169Updated 2 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Basic reverse shell in C using socket() with complete explanation☆69Updated 2 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆103Updated 5 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆150Updated last year
- A public, open source physical security methodology☆47Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated 11 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 3 years ago
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆154Updated 2 years ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- External Playbooks for Public Access☆41Updated last year
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 3 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month