sadreck / crackerjackLinks
CrackerJack / Hashcat Web Interface / Context Information Security
☆64Updated 9 months ago
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Updated 3 months ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Legba recipes.☆51Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆94Updated 3 weeks ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆28Updated 4 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆49Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆165Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- ☆10Updated 10 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆21Updated 8 months ago
- Python3 script to dump breach data from Dehashed☆42Updated 7 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Various wordlists☆71Updated last month
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated last week
- A WLAN red team framework.☆155Updated last week
- karma WiFi attack implementation☆55Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 9 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated 3 weeks ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆56Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- ☆61Updated last month