pabloav / aws-cudahashcat-auto
Automated password cracking with AWS GPU instances and CUDA hashcat
☆51Updated 10 years ago
Alternatives and similar repositories for aws-cudahashcat-auto:
Users that are interested in aws-cudahashcat-auto are comparing it to the libraries listed below
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- ☆74Updated 2 years ago
- ☆57Updated 4 years ago
- ☆25Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Automated enumeration☆30Updated 4 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago