ins1gn1a / Hexcat
Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords
☆23Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hexcat
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆35Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Merge multiple nMap xml files into one☆49Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆23Updated 4 years ago
- A simple, fast port scanner that can work with Nmap.☆10Updated 3 years ago
- ☆40Updated 3 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆36Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 2 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 5 years ago
- ☆20Updated 3 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆16Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 4 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆23Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆21Updated 2 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆22Updated last year
- Post-exploitation tool☆26Updated 3 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆28Updated 3 years ago