jtesta / rainbowcrackalack
Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!
☆196Updated 3 years ago
Alternatives and similar repositories for rainbowcrackalack:
Users that are interested in rainbowcrackalack are comparing it to the libraries listed below
- Evil client portion of EAP relay attack☆196Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆288Updated 3 months ago
- Script for orchestrating mana rogue WiFi Access Points.☆237Updated 2 weeks ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆106Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 3 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆85Updated last year
- This is a weaponized WSUS exploit☆283Updated 2 years ago
- A hashcat-based distributed password cracking system☆150Updated 6 months ago
- ☆219Updated 8 months ago
- A framework for stealthy domain reconnaissance☆298Updated 3 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- Pypykatz server☆125Updated 5 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- OneRuleToRuleThemAll... hashcat optimised rule☆86Updated 2 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆362Updated last year
- An SNMPv3 User Enumerator and Attack tool☆251Updated 4 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆92Updated 11 months ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆57Updated 6 months ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆183Updated 4 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆377Updated 4 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆339Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆220Updated 5 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆99Updated 8 months ago
- Responder for Python3☆100Updated 5 years ago
- Detect & filter duplicate hashcat rules☆43Updated last month
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆123Updated 2 years ago
- ☆189Updated 6 months ago
- unix SSH post-exploitation 1337 tool☆136Updated 6 years ago