pabloav / aws-cudahashcat-auto
Automated password cracking with AWS GPU instances and CUDA hashcat
☆51Updated 10 years ago
Alternatives and similar repositories for aws-cudahashcat-auto:
Users that are interested in aws-cudahashcat-auto are comparing it to the libraries listed below
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Rogue AP killer☆89Updated 7 years ago
- tundeep☆42Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- ☆25Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆37Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago