kholia / fvde2john
See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.
☆16Updated 6 years ago
Alternatives and similar repositories for fvde2john:
Users that are interested in fvde2john are comparing it to the libraries listed below
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆11Updated last year
- ☆16Updated 7 months ago
- Parser for Windows PowerShell script block logs☆13Updated 2 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- macOS Endpoint Security Message Analysis Tool☆45Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Kibana app for RedELK☆16Updated last year
- visually see issues with supported cipher suites☆16Updated 8 months ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- Fuzz Network Traffic☆18Updated 2 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆18Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Haschcat Rules processor☆13Updated last year
- JXA script for Mythic that prints the TCC.db☆15Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 4 months ago