pabloav / aws-cudahashcat-auto
Automated password cracking with AWS GPU instances and CUDA hashcat
☆50Updated 9 years ago
Related projects: ⓘ
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 9 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 6 years ago
- irc bot to scan & bruteforce ssh/telnet☆6Updated 5 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆47Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 7 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆78Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 7 years ago
- Collection of metasploit modules☆65Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- A tool to catch spoofed NBNS responses.☆48Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Rogue AP killer☆86Updated 6 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆42Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆114Updated 6 years ago
- Common Findings Database☆100Updated 5 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆31Updated 2 years ago
- Get email notification when Virus Total has a copy of your binary.☆166Updated 4 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- Tampermonkey script to extract information from Meteor applications☆33Updated 7 years ago
- Analysis of wifi probe request data☆11Updated 6 years ago
- Nmap enumeration and script scan automation script☆38Updated last year
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago