rungrape / Half-WPA-converter
Converts Half-WPA handshake to hashcat
☆18Updated 6 years ago
Alternatives and similar repositories for Half-WPA-converter:
Users that are interested in Half-WPA-converter are comparing it to the libraries listed below
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Vulnerability Scanner☆12Updated 10 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- MS17-010☆12Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- ☆15Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago