sadreck / crackerjack
CrackerJack / Hashcat Web Interface / Context Information Security
☆25Updated 10 months ago
Alternatives and similar repositories for crackerjack:
Users that are interested in crackerjack are comparing it to the libraries listed below
- Legba recipes.☆43Updated 5 months ago
- Rubber Ducky powered by NeoKey☆20Updated 7 months ago
- AutoPoC Generator HoneyPoC☆34Updated 6 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 9 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- ☆37Updated 8 months ago
- A user enumeration tool for Slack.☆24Updated 7 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆27Updated 10 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆69Updated 11 months ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 9 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆10Updated 2 weeks ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆34Updated 6 months ago
- Script to perform some hashcracking logic automagically☆67Updated 8 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- Ease and assist the compromise of an Active Directory environment.☆27Updated 3 years ago
- Modular framework to exploit UPS devices☆62Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆99Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 6 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆18Updated 2 years ago
- One line command and control backdoors for APIs and web applications.☆50Updated 9 months ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆45Updated 4 years ago