This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to files.
☆189Oct 17, 2024Updated last year
Alternatives and similar repositories for Dehashed
Users that are interested in Dehashed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆53Feb 28, 2026Updated last month
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆25Feb 27, 2023Updated 3 years ago
- C# implementation of harmj0y's PowerView☆47Mar 22, 2020Updated 6 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,295Feb 16, 2026Updated last month
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,660Jan 15, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ADCS abuser☆317Feb 6, 2023Updated 3 years ago
- Kerberoast with ACL abuse capabilities☆632Dec 16, 2024Updated last year
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆154Apr 20, 2022Updated 3 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆134Aug 20, 2018Updated 7 years ago
- A Python based ingestor for BloodHound☆2,373Oct 24, 2025Updated 5 months ago
- Tool to audit and attack LAPS environments☆935Jan 31, 2018Updated 8 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆438Jul 29, 2013Updated 12 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆891Jan 3, 2025Updated last year
- Joomla login bruteforce☆111Jul 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Username enumeration and password spraying tool aimed at Microsoft O365.☆986Nov 6, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,937Nov 19, 2025Updated 4 months ago
- Active Directory Integrated DNS dumping by any authenticated user☆1,152Apr 4, 2025Updated last year
- A phonebook.cz scraper☆16Apr 28, 2023Updated 2 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆891Apr 8, 2025Updated last year
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆185Aug 7, 2025Updated 8 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Ultra-fast SNMPv1/v2 stack. Get/set/walk tens of thousands of hosts at once.☆87Sep 8, 2024Updated last year
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆956Apr 20, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Compiled Binaries for Ghostpack☆1,635Oct 24, 2024Updated last year
- ☆193Jan 12, 2026Updated 3 months ago
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆919Oct 15, 2024Updated last year
- ☆169Sep 18, 2025Updated 6 months ago
- Extracts Key Values from .keytab files☆353Aug 26, 2020Updated 5 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,780Feb 27, 2026Updated last month
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆942Jul 26, 2021Updated 4 years ago
- This script will scrape LinkedIn based on company IDs and will return ALL names associated with the searcht. You can then take these name…☆14Nov 11, 2022Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆988Jan 29, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆2,042Jul 11, 2024Updated last year
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆36May 1, 2018Updated 7 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,216Aug 15, 2024Updated last year
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆83Feb 21, 2019Updated 7 years ago
- GitLab User Enumeration☆57Jan 3, 2025Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆3,296Aug 20, 2024Updated last year
- ☆259Feb 17, 2023Updated 3 years ago