raoul361 / AWS-hash-crackingLinks
Cracking hashes using AWS GPU instances
☆10Updated 7 years ago
Alternatives and similar repositories for AWS-hash-cracking
Users that are interested in AWS-hash-cracking are comparing it to the libraries listed below
Sorting:
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 4 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- CVE-2020-0688☆10Updated 5 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- Event Data Collector☆37Updated last month
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆20Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- An advanced command-line search engine for Exploit-DB☆16Updated 3 years ago
- talking LED mask for BSides 2020 presenters☆22Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 5 years ago
- POC code to crash Windows Event Logger Service☆26Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago