shmuelamar / crackenView external linksLinks
a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust
☆369Nov 22, 2021Updated 4 years ago
Alternatives and similar repositories for cracken
Users that are interested in cracken are comparing it to the libraries listed below
Sorting:
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆484Sep 24, 2025Updated 4 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,322Updated this week
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆966Nov 4, 2025Updated 3 months ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 2 years ago
- Customized Password/Passphrase List inputting Target Info☆96Nov 10, 2024Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,254Mar 19, 2025Updated 10 months ago
- rcat☆75Mar 7, 2022Updated 3 years ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 5 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,174Jan 5, 2026Updated last month
- Wordlists handcrafted (and automated) with ♥☆228Aug 1, 2025Updated 6 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- ☆225Oct 22, 2023Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Feb 11, 2025Updated last year
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 10 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆930Nov 11, 2024Updated last year
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- ☆307Mar 15, 2025Updated 11 months ago
- ☆1,665Apr 14, 2025Updated 10 months ago
- ☆46Mar 20, 2021Updated 4 years ago
- Sandman is a NTP based backdoor for hardened networks.☆816Mar 31, 2024Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,046Oct 14, 2025Updated 4 months ago
- A small reverse shell for Linux & Windows☆625Jun 5, 2024Updated last year
- The swiss army knife of LSASS dumping☆2,069Sep 17, 2024Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Jan 17, 2022Updated 4 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆411Mar 21, 2025Updated 10 months ago
- Windows Privilege Escalation from User to Domain Admin.☆1,438Dec 18, 2022Updated 3 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,294Updated this week
- Rule for hashcat or john. Aiming to crack how people generate their password☆459Sep 2, 2024Updated last year
- CrackerJack / Hashcat Web Interface / Context Information Security☆381Feb 1, 2024Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆191May 26, 2020Updated 5 years ago