sadreck / crackerjackLinks
CrackerJack / Hashcat Web Interface / Context Information Security
☆64Updated 8 months ago
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- Legba recipes.☆51Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Updated 2 months ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆27Updated 4 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- Visualize BBOT scans in realtime with VivaGraphJS☆59Updated last year
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- karma WiFi attack implementation☆55Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆91Updated last week
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆133Updated last week
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- A WLAN red team framework.☆155Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- ☆76Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated 2 weeks ago
- Various wordlists☆72Updated last month
- Gadget IoC removal from HAK5's BashBunny☆21Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated last month
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- ☆198Updated 3 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 4 months ago
- ☆23Updated 5 years ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆56Updated last year