Medusa combo files, Hashcat rules and dictionaries, JRT rules
☆14Oct 20, 2022Updated 3 years ago
Alternatives and similar repositories for RedHash
Users that are interested in RedHash are comparing it to the libraries listed below
Sorting:
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 3 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- Random OSINT idea tool thing☆24Jan 11, 2026Updated 2 months ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆84Jun 12, 2021Updated 4 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- ☆13Nov 27, 2020Updated 5 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- Веб-интерфейс для easy-vk-tunnel. Позволяет получать новые VLESS-ссылки через VK Tunnel, копировать их или сканировать QR-код прямо из бр…☆35Sep 29, 2025Updated 5 months ago
- MalDev & AV-EDR Evasion for Pentesters☆20Feb 17, 2023Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆14Nov 25, 2021Updated 4 years ago
- Rebuild of portspoof in GO with additional features.☆29Oct 24, 2025Updated 4 months ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago