netmux / survivor-hashes
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 6 years ago
Alternatives and similar repositories for survivor-hashes:
Users that are interested in survivor-hashes are comparing it to the libraries listed below
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Assists in mass exportation of Nessus scans☆19Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆22Updated 4 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- Test Azure environment for MFA misconfigurations☆10Updated 2 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆24Updated 8 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- wordlists for password cracking☆26Updated 2 years ago
- Python crawler for remote Windows shares☆12Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Miscellaneous for various things☆20Updated 3 months ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- ☆16Updated 7 years ago
- ☆19Updated 4 years ago
- A parser to extract information from .nessus file format☆23Updated 3 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 6 years ago
- My pentest cheat sheet☆15Updated 7 years ago
- Scripts to query local admins quickly☆9Updated 9 years ago