Left To My Own Devices - NT hash tools
☆40Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for ntcrack
Users that are interested in ntcrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kerberos in rust for fun and profit☆66Mar 13, 2026Updated last week
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Check robustness of your (their) Active Directory accounts passwords☆45Mar 13, 2026Updated 2 weeks ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆29Mar 2, 2023Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆98Dec 28, 2025Updated 2 months ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆90Jan 24, 2026Updated 2 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Convenience tool for hashcat☆121Aug 26, 2025Updated 7 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Jun 15, 2017Updated 8 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Oct 10, 2019Updated 6 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago