netmux / survivor-hashes
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 5 years ago
Alternatives and similar repositories for survivor-hashes:
Users that are interested in survivor-hashes are comparing it to the libraries listed below
- Assists in mass exportation of Nessus scans☆18Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Kibana app for RedELK☆16Updated last year
- wordlists for password cracking☆25Updated 2 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- parsers to make life easier☆12Updated 4 years ago
- ☆19Updated 4 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆22Updated 4 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆19Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆32Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Hostile Dropboxes Management☆25Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 6 years ago
- ☆16Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- ☆34Updated 4 years ago
- ☆10Updated last year
- Test Azure environment for MFA misconfigurations☆10Updated 2 years ago