Left To My Own Devices - NT hash tools
☆40Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for ntcrack
Users that are interested in ntcrack are comparing it to the libraries listed below
Sorting:
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 3 weeks ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- ☆30Mar 2, 2023Updated 3 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- Check robustness of your (their) Active Directory accounts passwords☆45Mar 5, 2025Updated 11 months ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Dec 22, 2021Updated 4 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Jul 1, 2019Updated 6 years ago
- quotes i like.☆17Aug 1, 2019Updated 6 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Oct 10, 2019Updated 6 years ago
- AWS IAM resources search tool☆21May 5, 2021Updated 4 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago