netmux / survivor-hashes
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 5 years ago
Related projects: ⓘ
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆11Updated 7 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- wordlists for password cracking☆25Updated 2 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆22Updated 10 years ago
- Hostile Dropboxes Management☆25Updated 4 years ago
- Haschcat Rules processor☆13Updated last year
- ☆22Updated 3 years ago
- Assists in mass exportation of Nessus scans☆18Updated 6 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- ☆16Updated 7 years ago
- ☆15Updated this week
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- Next Generation of White Chapel☆21Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 7 years ago
- Ansible scripts to build an attack box☆22Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- ☆24Updated this week
- Collection of things made during my SLAE 32-bit journey☆14Updated 2 years ago
- Python crawler for remote Windows shares☆12Updated 8 years ago
- LetMeOutOfYour.net Resources☆19Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- ☆33Updated 4 years ago
- ☆12Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Updated 7 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago