javydekoning / aws-hashcat
hashcat benchmarks on AWS instances
☆37Updated 11 months ago
Related projects: ⓘ
- Merge multiple nMap xml files into one☆47Updated 5 years ago
- A stand-alone implementation of Hashcat's rule engine☆32Updated 8 years ago
- Extract credentials and other useful info from network captures☆58Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆67Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆66Updated 7 months ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆16Updated 5 years ago
- ☆18Updated this week
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆32Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆24Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆38Updated 3 years ago
- Detect & filter duplicate hashcat rules☆40Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated last month
- ☆39Updated 2 months ago
- Fly into Gophish with One Click (Infra Automation)☆42Updated last year
- Protocol agnostic online password guessing API.☆79Updated last year
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking. It facilitates the creation of custom rules and…☆17Updated this week
- Passive internal reconnaissance tool☆67Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆67Updated 3 weeks ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 6 years ago
- Distillations and expansions on Rocktastic12a☆13Updated 2 years ago
- Wireless Pentesting Device☆17Updated 4 years ago
- ☆27Updated 4 years ago
- Phishing campaign docker composition for Gophish☆36Updated this week
- Next generation fireprox AWS API endpoint creation utility.☆41Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆24Updated last year
- ☆146Updated last year
- Script to perform some hashcracking logic automagically☆61Updated 4 months ago
- Crack passwords using Terraform and AWS☆42Updated 5 years ago
- Mass target enumeration☆26Updated 3 years ago