netmux / survivor-hashesLinks
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 6 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below
Sorting:
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Assists in mass exportation of Nessus scans☆21Updated 7 years ago
- A location where I save and share notes about security topics.☆11Updated 5 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 11 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- ☆22Updated 4 years ago
- wordlists for password cracking☆28Updated 2 years ago
- ☆9Updated 8 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Free Email Providers☆10Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- ☆14Updated 3 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- PowerShell version of Fail2Ban☆12Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- XLSX parser for nessus and nmap scan results.☆13Updated 5 years ago