netmux / survivor-hashesLinks
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 6 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below
Sorting:
- Zone transfers for rwhois☆20Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Random Hashcat Scrips☆31Updated 10 months ago
- Miscellaneous for various things☆21Updated 9 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- ☆16Updated 8 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago