jtesta / rainbowcrackalack
Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!
☆183Updated 3 years ago
Related projects: ⓘ
- Evil client portion of EAP relay attack☆186Updated last year
- An SNMPv3 User Enumerator and Attack tool☆238Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆355Updated 7 months ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆102Updated 4 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆297Updated 3 months ago
- Common password pattern generator using strings list☆129Updated 3 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆284Updated 3 months ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆121Updated last year
- OneRuleToRuleThemAll... hashcat optimised rule☆80Updated 3 years ago
- ☆209Updated 3 months ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆371Updated 3 years ago
- This is a weaponized WSUS exploit☆278Updated last year
- Various scripts for penetration testing☆130Updated 4 months ago
- Script for orchestrating mana rogue WiFi Access Points.☆222Updated 3 weeks ago
- A framework for stealthy domain reconnaissance☆292Updated 2 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆211Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆81Updated 3 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆176Updated 5 years ago
- Windows active user credential phishing tool☆277Updated 4 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆85Updated 6 months ago
- ☆234Updated 5 years ago
- an asynchronous target enumeration tool☆239Updated last year
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆179Updated 4 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆227Updated last year
- Script collection to bypass Network Access Control (NAC, 802.1x)☆262Updated 4 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆77Updated last year
- locate and attack Lync/Skype for Business☆330Updated 2 months ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆123Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆116Updated 3 months ago
- Zero Infrastructure Password Cracking☆389Updated 3 weeks ago