sensepost / common-substrLinks
Simple tool to extract the most common substrings from an input text. Built for password cracking.
☆65Updated 4 years ago
Alternatives and similar repositories for common-substr
Users that are interested in common-substr are comparing it to the libraries listed below
Sorting:
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Random Hashcat Scrips☆29Updated 8 months ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- ☆16Updated 7 years ago
- Collection of rules and debug data for hashcat☆19Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 6 years ago
- Enumerate RIDs using pure Python☆31Updated 10 months ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- Network Finger Printer☆16Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Python port of Pipal for password analytics☆22Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆31Updated 6 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆20Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- Miscellaneous for various things☆21Updated 7 months ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- ☆17Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago