n0kovo / danish-wordlistsLinks
Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)
☆25Updated 2 years ago
Alternatives and similar repositories for danish-wordlists
Users that are interested in danish-wordlists are comparing it to the libraries listed below
Sorting:
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Wireless Pentesting Device☆22Updated 4 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆46Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- Commands used in Windows penetration tests☆53Updated 3 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- ☆33Updated last year
- Script to perform some hashcracking logic automagically☆72Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- ☆10Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago