jmagers / MacinHashLinks
Convert MacOS plist password file to hash file for password crackers
☆35Updated 6 years ago
Alternatives and similar repositories for MacinHash
Users that are interested in MacinHash are comparing it to the libraries listed below
Sorting:
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Updated 8 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆32Updated 4 years ago
- Eddie Vetter - triage macOS applications for security research☆16Updated 4 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Small scripts and POCs related to digital forensics☆17Updated 2 years ago
- A triage data collection script for macOS☆28Updated 4 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Updated 4 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Updated 8 years ago
- Tool to rip system and user data from OSX and macOS☆16Updated 2 years ago
- ☆24Updated 2 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- A simple yet beautiful phishing proxy.☆56Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Scripts for encoding files through DNS TXT records☆11Updated 8 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Batch scripts to capture volatile and log information from a target system☆19Updated 10 years ago
- Search bing with python☆12Updated 10 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- A pure python, post-exploitation, remote administration tool (RAT) for macOS / OS X.☆47Updated 8 years ago