kleprevost / saladcatLinks
A distributed hashcat implementation using Salad Cloud and Hashtopolis
☆40Updated last year
Alternatives and similar repositories for saladcat
Users that are interested in saladcat are comparing it to the libraries listed below
Sorting:
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- top usernames from azure survey 2025☆14Updated 3 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- ☆41Updated last year
- Top hashpwn rules☆20Updated 8 months ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆29Updated 3 weeks ago
- tool for identifying guest relationships between companies☆101Updated last year
- CVE-2013-4786 Go exploitation tool☆39Updated last year
- ☆32Updated 2 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 4 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 8 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 6 months ago
- Nemesis agent for Mythic☆27Updated 11 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Discord C2 Profile for Mythic☆31Updated 5 months ago
- A user enumeration tool for Slack.☆30Updated last year
- ☆17Updated 7 months ago
- Mythic Scripting PyPi package - mythic☆24Updated 2 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆14Updated 10 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆64Updated this week
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 9 months ago
- ☆16Updated 11 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 5 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 5 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆41Updated 5 months ago
- self-hosted Azure OSINT tool☆31Updated last month