n0kovo / danish-wordlists
Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)
☆24Updated 2 years ago
Alternatives and similar repositories for danish-wordlists:
Users that are interested in danish-wordlists are comparing it to the libraries listed below
- scripts to setup environments for red/blue teams.☆16Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- Custom pentesting tools☆25Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- A user enumeration tool for Slack.☆26Updated 9 months ago
- AutoPoC Generator HoneyPoC☆35Updated 8 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 9 months ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 3 years ago
- ☆10Updated last year
- Fly into Gophish with One Click (Infra Automation)☆47Updated 2 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆45Updated 5 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated 2 years ago
- ☆41Updated 4 years ago
- Thor Artifacts for Velociraptor☆15Updated 9 months ago
- Commands used in Windows penetration tests☆50Updated 3 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated last year
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago