netmux / survivor-hashes
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 6 years ago
Alternatives and similar repositories for survivor-hashes:
Users that are interested in survivor-hashes are comparing it to the libraries listed below
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago
- ☆18Updated last year
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆14Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆11Updated 2 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆25Updated 10 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated last year
- Useful Windows and AD tools☆15Updated 3 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- wordlists for password cracking☆27Updated 2 years ago
- parsers to make life easier☆13Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆20Updated 5 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- ☆9Updated 8 years ago
- ☆30Updated 6 years ago