pabloav / aws-cudahashcat-auto
Automated password cracking with AWS GPU instances and CUDA hashcat
☆51Updated 10 years ago
Alternatives and similar repositories for aws-cudahashcat-auto
Users that are interested in aws-cudahashcat-auto are comparing it to the libraries listed below
Sorting:
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- ☆57Updated 4 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆62Updated 8 years ago
- Rogue AP killer☆89Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆28Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Automated enumeration☆30Updated 4 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 11 months ago
- Common Findings Database☆100Updated 5 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- ☆25Updated 8 years ago