sadreck / crackerjackLinks
CrackerJack / Hashcat Web Interface / Context Information Security
☆54Updated 2 months ago
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆45Updated last week
- Script to perform some hashcracking logic automagically☆71Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆29Updated 2 years ago
- ☆74Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆45Updated last month
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Updated 9 months ago
- Various wordlists☆63Updated 6 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆108Updated 7 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Updated last year
- Collection of extra pentest tools for Kali Linux☆107Updated 2 years ago
- Azure Service Subdomain Enumeration☆61Updated 9 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆31Updated 2 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆41Updated 3 months ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆33Updated last week
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆45Updated 7 months ago
- Pentest/Red Team: Resources, repos and scripts.☆69Updated 2 weeks ago
- Python3 script to dump breach data from Dehashed☆32Updated last month
- ☆77Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 4 months ago
- Enumeration & fingerprint tool☆25Updated last year
- Tools and Resources for Physical Security Red Teaming☆32Updated 2 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 11 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆74Updated last month