samirettali / password-cracking-rulesView external linksLinks
A collection of password cracking rules
☆20Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for password-cracking-rules
Users that are interested in password-cracking-rules are comparing it to the libraries listed below
Sorting:
- [CVE-2017-9822] DotNetNuke Cookie Deserialization Remote Code Execution (RCE)☆20Aug 30, 2020Updated 5 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- ☆31Feb 3, 2026Updated last week
- ☆10Oct 9, 2024Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Public feedback discussions for WLAN Pi, our software, and more!☆10Oct 18, 2024Updated last year
- ☆12Mar 8, 2025Updated 11 months ago
- An Ansible playbook and configuration guide for automating the creation of ISE in AWS and securely connecting it with auto-VPN to your ot…☆12Jun 1, 2024Updated last year
- C# .NET Assembly for interacting with File Object DACLs☆46Apr 3, 2020Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- an experimental implementation of Burrow's delta in Python 3☆12Jun 6, 2017Updated 8 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆15Jun 2, 2025Updated 8 months ago
- ☆11Oct 30, 2025Updated 3 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Update an ECS service to use a new Docker image☆13Updated this week
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Awesome maintained collection of OSINT related resources. (All Free & Actionable)☆11Nov 4, 2018Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Write-ups cho một số bài trên Reversing.kr☆12Mar 24, 2023Updated 2 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆11Dec 28, 2025Updated last month
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆11Jan 1, 2025Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- Sample Python apps based on the simple Python examples from https://github.com/cisco-pxgrid/pxgrid-rest-ws☆13Jun 7, 2025Updated 8 months ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Cross-Platform SDR Software☆14Jul 9, 2025Updated 7 months ago
- Open-source drop-in replacement for IOUlive (written in Perl)☆17May 23, 2016Updated 9 years ago
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 6 months ago
- PoC of CVE-2019-15126 kr00k vulnerability☆12Mar 19, 2020Updated 5 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago