Some Hashcat Rules for 2020 and beyond. Contributions encouraged!
☆26May 26, 2022Updated 3 years ago
Alternatives and similar repositories for HashCant
Users that are interested in HashCant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last month
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 7 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Mythic Scripting PyPi package - mythic☆29Oct 10, 2025Updated 5 months ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- ☆26May 22, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆144Oct 31, 2017Updated 8 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- ☆65Jan 17, 2026Updated 2 months ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- This code was used for the blogpost on secjuice.☆43Apr 17, 2019Updated 6 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆122Sep 14, 2021Updated 4 years ago