sm00v / DehashedLinks
This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to files.
☆131Updated 7 months ago
Alternatives and similar repositories for Dehashed
Users that are interested in Dehashed are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- Joomla login bruteforce☆69Updated 10 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- Password spraying tool and Bloodhound integration☆234Updated 5 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆332Updated 7 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆93Updated last year
- Simple HTTP listener for security testing☆114Updated 6 months ago
- A cheatsheet for NetExec☆122Updated 4 months ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Create a list of possible usernames for bruteforcing☆67Updated last year
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- parse nmap files☆151Updated last year
- ☆35Updated 3 years ago
- ☆66Updated 3 years ago
- Some of my personal notes that helped me pass the OSWP☆53Updated 3 years ago
- ☆43Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- My notes containing the Certified Red Team Professional Course☆55Updated 8 months ago
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆53Updated 4 months ago
- ☆199Updated 3 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆64Updated last year
- Powershell script to extract information from boot PXE☆141Updated 6 years ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆108Updated this week
- ☆48Updated last year
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆91Updated 6 years ago
- Incursore came from nmapAutomator to be your personal raider while you enumerate a target.☆54Updated 10 months ago
- ☆74Updated last year
- PowerShell & Python tools developed for CTFs and certification exams☆43Updated 2 weeks ago