sepehrdaddev / hashcobraLinks
HashCobra Hash Cracking tool.
☆123Updated 4 years ago
Alternatives and similar repositories for hashcobra
Users that are interested in hashcobra are comparing it to the libraries listed below
Sorting:
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 3 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Using IPv6 to Bypass Security☆93Updated 2 months ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Framework for exploiting local vulnerabilities☆84Updated last year
- Kal El Network Stress Test and Penetration Testing Toolkit☆57Updated last year
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- One line PS scripts that may come handy during your network assesment☆77Updated 5 years ago
- unix SSH post-exploitation 1337 tool☆143Updated 6 years ago
- Search drives for documents containing passwords☆64Updated 11 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆106Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆34Updated 4 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 4 years ago
- Automate Metasploit scanning and exploitation☆116Updated 3 months ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Wavestone's web interface for password cracking with hashcat☆172Updated 4 years ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Updated 2 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago