rarecoil / ai-passwordsLinks
Password lists generated by deep learning algorithms.
☆31Updated 5 years ago
Alternatives and similar repositories for ai-passwords
Users that are interested in ai-passwords are comparing it to the libraries listed below
Sorting:
- Haschcat Rules processor☆14Updated 2 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- ☆33Updated 6 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- ☆4Updated 2 years ago
- Dehashed API CLI☆21Updated 4 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Python port of Pipal for password analytics☆22Updated last year
- FETCH THE PASSWORD STRETCHER☆39Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- wordlists for password cracking☆28Updated 2 years ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated 3 weeks ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago