rarecoil / pantagruleLinks
large hashcat rulesets generated from real-world compromised passwords
☆398Updated 5 years ago
Alternatives and similar repositories for pantagrule
Users that are interested in pantagrule are comparing it to the libraries listed below
Sorting:
- Rule for hashcat or john. Aiming to crack how people generate their password☆456Updated last year
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆578Updated last year
- A mostly-serverless distributed hash cracking platform☆632Updated 2 weeks ago
- Zero Infrastructure Password Cracking☆411Updated last year
- Script collection to bypass Network Access Control (NAC, 802.1x)☆332Updated 2 weeks ago
- A web front-end for password cracking and analytics☆386Updated last month
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆380Updated last year
- OneRuleToRuleThemAll... hashcat optimised rule☆102Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆303Updated last year
- My Password Cracking Methodology☆83Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆192Updated 5 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 4 years ago
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆594Updated 4 months ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆962Updated last year
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆191Updated 2 years ago
- Chameleon: A tool for evading Proxy categorisation☆510Updated last year
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆136Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- Dirty python script to munge dictionary words into password.☆72Updated last week
- Kerberoast attack -pure python-☆434Updated 2 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆342Updated 7 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆501Updated 3 months ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆120Updated 2 weeks ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆758Updated last year
- Evil client portion of EAP relay attack☆212Updated 2 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,220Updated 3 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆230Updated 6 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆372Updated 5 years ago