javydekoning / aws-hashcat
hashcat benchmarks on AWS instances
☆37Updated 3 months ago
Alternatives and similar repositories for aws-hashcat:
Users that are interested in aws-hashcat are comparing it to the libraries listed below
- Analyze ARP requests to identify hosts that are communicating with one another.☆17Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆69Updated 11 months ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Detect & filter duplicate hashcat rules☆41Updated this week
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Phishing campaign docker composition for Gophish☆38Updated 4 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated 11 months ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- Random Hashcat Scrips☆24Updated 3 months ago
- Various scripts and codes☆83Updated 3 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆42Updated last week
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Updated 6 years ago
- General scripts that gather information out of Active Directory☆16Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- Bulk hostname lookup using shodan☆15Updated 2 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆34Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 4 months ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆43Updated 11 months ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Script to perform some hashcracking logic automagically☆67Updated 8 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆18Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year