netmux / survivor-hashesLinks
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 6 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below
Sorting:
- Zone transfers for rwhois☆20Updated 6 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- Screenshot Shenanigans☆26Updated 8 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 6 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 9 years ago
- Clean public password dump files and store in ELK☆38Updated 8 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Random Hashcat Scrips☆35Updated last year
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Miscellaneous for various things☆21Updated last year
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Updated 7 years ago