This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to files.
☆185Oct 17, 2024Updated last year
Alternatives and similar repositories for Dehashed
Users that are interested in Dehashed are comparing it to the libraries listed below
Sorting:
- ☆46Updated this week
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 3 years ago
- C# implementation of harmj0y's PowerView☆46Mar 22, 2020Updated 5 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,262Feb 16, 2026Updated 2 weeks ago
- ADCS abuser☆314Feb 6, 2023Updated 3 years ago
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,637Jan 15, 2024Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆611Dec 16, 2024Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆129Aug 20, 2018Updated 7 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆429Jul 29, 2013Updated 12 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆882Jan 3, 2025Updated last year
- A Python based ingestor for BloodHound☆2,347Oct 24, 2025Updated 4 months ago
- Joomla login bruteforce☆105Jul 18, 2024Updated last year
- Tool to audit and attack LAPS environments☆928Jan 31, 2018Updated 8 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆883Apr 8, 2025Updated 10 months ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆149Apr 20, 2022Updated 3 years ago
- Compiled Binaries for Ghostpack☆1,604Oct 24, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,913Nov 19, 2025Updated 3 months ago
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 8 months ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆35May 1, 2018Updated 7 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆979Nov 6, 2024Updated last year
- Active Directory Integrated DNS dumping by any authenticated user☆1,135Apr 4, 2025Updated 11 months ago
- GitLab User Enumeration☆53Jan 3, 2025Updated last year
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆908Oct 15, 2024Updated last year
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,745Updated this week
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆928Jul 26, 2021Updated 4 years ago
- ☆187Jan 12, 2026Updated last month
- Active Directory Auditing and Enumeration☆517Dec 3, 2025Updated 3 months ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆949Apr 20, 2022Updated 3 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆179Aug 7, 2025Updated 6 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,255Aug 20, 2024Updated last year
- A program to find the real string for your hash. MD5, SHA256, any really. Works really fast, gets to the "aaaa" combo in about 1 second e…☆18Jun 5, 2021Updated 4 years ago
- ☆757Feb 3, 2026Updated last month
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,186Aug 15, 2024Updated last year
- Loads a custom dll in system32 via diaghub.☆82Mar 16, 2020Updated 5 years ago
- Username tools for penetration testing☆1,333Sep 20, 2024Updated last year
- Wfuzz fork☆39Jan 10, 2025Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- C# Data Collector for BloodHound☆1,198Updated this week