netmux / HASH-CRACK
Password Cracking Manual (Online Resources)
☆22Updated 7 years ago
Alternatives and similar repositories for HASH-CRACK:
Users that are interested in HASH-CRACK are comparing it to the libraries listed below
- Side Channel script☆25Updated last year
- Red Team Tool Kit☆15Updated 5 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆48Updated 7 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆21Updated 5 years ago
- Simple Karma Attack☆66Updated 4 years ago
- Penetration Testing/Security Cheatsheets☆58Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆41Updated 9 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- ☆15Updated last year
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆16Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- ☆18Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated 7 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- Malicious Link Blog☆24Updated last year
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- ☆52Updated 10 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Collection of tips, tools and tutorials around infosec☆32Updated 7 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Updated 6 years ago