netmux / survivor-hashesLinks
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 6 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below
Sorting:
- wordlists for password cracking☆28Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Random Hashcat Scrips☆32Updated 11 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- ☆36Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- ☆16Updated 8 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 5 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Updated 9 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago