CrackerJack / Hashcat Web Interface / Context Information Security
☆63Apr 24, 2025Updated 10 months ago
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- ☆14Sep 8, 2024Updated last year
- CrackerJack / Hashcat Web Interface / Context Information Security☆380Feb 1, 2024Updated 2 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆25Updated this week
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Tool for enumerating Active Directory environments☆48Aug 10, 2023Updated 2 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- CVE-2018-6066 using VBA☆67Oct 24, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Sep 29, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Dec 10, 2022Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- ☆31Feb 27, 2026Updated last week
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- An authentication handler for using CredSSP with Python Requests.☆23May 31, 2023Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- ☆23Jun 9, 2024Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A Simple Fully Functional Firewall in Rust☆23Jan 15, 2024Updated 2 years ago