A collection of password cracking rules
☆21Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for password-cracking-rules
Users that are interested in password-cracking-rules are comparing it to the libraries listed below
Sorting:
- [CVE-2017-9822] DotNetNuke Cookie Deserialization Remote Code Execution (RCE)☆21Aug 30, 2020Updated 5 years ago
- My Leetcode Problems' Solutions☆11Sep 7, 2023Updated 2 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- Collection of Rust repos useful for Red Teamers.☆34Sep 23, 2022Updated 3 years ago
- ☆10Oct 9, 2024Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆13Jan 17, 2025Updated last year
- An Ansible playbook and configuration guide for automating the creation of ISE in AWS and securely connecting it with auto-VPN to your ot…☆12Jun 1, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- C# .NET Assembly for interacting with File Object DACLs☆45Apr 3, 2020Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆11Jan 1, 2025Updated last year
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- ☆11Dec 28, 2025Updated 2 months ago
- A powerful command-line interface for Perplexity AI with ultra-fast RAG capabilities. Built with ❤️ for developers who need lightning-fas…☆22Dec 28, 2025Updated 2 months ago
- an experimental implementation of Burrow's delta in Python 3☆12Jun 6, 2017Updated 8 years ago
- WolvCtf-2023-Challenges-Public☆12Apr 13, 2023Updated 2 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- ☆11Oct 30, 2025Updated 4 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 10 months ago
- Update an ECS service to use a new Docker image☆13Updated this week
- Awesome maintained collection of OSINT related resources. (All Free & Actionable)☆12Nov 4, 2018Updated 7 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Just simple helper tool for generate github search link☆18Feb 28, 2021Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Sample Python apps based on the simple Python examples from https://github.com/cisco-pxgrid/pxgrid-rest-ws☆13Jun 7, 2025Updated 8 months ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Cross-Platform SDR Software☆17Jul 9, 2025Updated 7 months ago