generates weak passwords based on current date
☆44Jun 27, 2024Updated last year
Alternatives and similar repositories for weakpass_generator
Users that are interested in weakpass_generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆53Dec 4, 2020Updated 5 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆95Aug 19, 2024Updated last year
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 7 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Jun 26, 2018Updated 7 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆294May 2, 2024Updated 2 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆302Mar 4, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- ☆183Dec 18, 2018Updated 7 years ago
- Targeted Payload Execution☆101Apr 9, 2020Updated 6 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆180Oct 21, 2018Updated 7 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- ☆49May 12, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆22Oct 22, 2019Updated 6 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Apr 1, 2026Updated last month
- Sustainable shellcode evasion☆113Mar 20, 2026Updated last month
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Nov 21, 2024Updated last year
- ☆298Nov 9, 2020Updated 5 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Anonymize your hashcat formatted files for online cracking☆31Oct 27, 2024Updated last year
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago