A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.
☆26Dec 17, 2023Updated 2 years ago
Alternatives and similar repositories for Efficient_Corporate_Masks
Users that are interested in Efficient_Corporate_Masks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆139Dec 17, 2023Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 6 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Sep 7, 2019Updated 6 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆14Jan 25, 2022Updated 4 years ago
- Collection of hashcat lists and things.☆50Dec 18, 2019Updated 6 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆122Sep 14, 2021Updated 4 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆114Oct 10, 2021Updated 4 years ago
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆66Apr 13, 2024Updated 2 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆41Dec 5, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆94Oct 13, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆186Dec 5, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 3 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆190May 26, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- SANS Holiday Hack Challenge write-up template☆28Nov 20, 2023Updated 2 years ago
- code for the Proxy DLL example blog post☆62Oct 29, 2021Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- ☆17Apr 20, 2022Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year