Audits AD hashdump and looks for instances for password reuse
☆12Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for hashmatch
Users that are interested in hashmatch are comparing it to the libraries listed below
Sorting:
- ☆16Apr 14, 2020Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 6 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- A currated list of pentest tools that are in active use by the twitter infosec community.☆42Dec 29, 2019Updated 6 years ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- ☆30Sep 5, 2025Updated 5 months ago
- Random source codes☆26Dec 22, 2025Updated 2 months ago
- ☆58Jun 2, 2025Updated 9 months ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆38Jul 12, 2023Updated 2 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- ☆95Jan 20, 2018Updated 8 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Snap package for ADS-B, Mode S, and Mode 3A/3C demodulator and decoder☆10Dec 6, 2025Updated 2 months ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41May 3, 2021Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated 11 months ago
- ☆10Jan 14, 2022Updated 4 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago