sm00v / DehashedLinks
This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to files.
☆158Updated 11 months ago
Alternatives and similar repositories for Dehashed
Users that are interested in Dehashed are comparing it to the libraries listed below
Sorting:
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Create a list of possible usernames for bruteforcing☆77Updated last year
- A cheatsheet for NetExec☆142Updated 3 months ago
- Simple HTTP listener for security testing☆116Updated 10 months ago
- Some of my personal notes that helped me pass the OSWP☆56Updated 3 years ago
- ☆67Updated 3 years ago
- Password spraying tool and Bloodhound integration☆245Updated 9 months ago
- Powershell script to extract information from boot PXE☆148Updated 6 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆164Updated last month
- Abertay CMP202 Project☆34Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆337Updated 11 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- Joomla login bruteforce☆86Updated last year
- ☆48Updated last year
- parse nmap files☆154Updated 4 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- ☆45Updated last year
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- C# implementation of harmj0y's PowerView☆35Updated 5 years ago
- ☆25Updated 6 months ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆202Updated 10 months ago
- ☆223Updated 4 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆211Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆158Updated 2 years ago
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆70Updated 8 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆107Updated 7 years ago
- Personal notes used to pass the OSWP exam☆88Updated 3 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆21Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago