spipm / Dutch-Password-ListLinks
Dutch (custom) password lists and custom rules for cracking
☆48Updated 2 years ago
Alternatives and similar repositories for Dutch-Password-List
Users that are interested in Dutch-Password-List are comparing it to the libraries listed below
Sorting:
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated last year
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Diana Credential Recovery Framework☆66Updated 2 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57Updated 2 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆119Updated 3 weeks ago
- Gadget IoC removal from HAK5's BashBunny☆21Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 3 months ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated last year
- Purpose-built Red Team network hardware implant made from common components.☆25Updated 2 years ago
- Offensive tool to trigger network authentications as SYSTEM☆144Updated 4 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆40Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- offensive security scripts and documentation☆30Updated last month
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- Legba recipes.☆51Updated last year
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆91Updated 5 years ago
- A port scanner written purely in PowerShell.☆83Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆28Updated 4 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- ☆81Updated 3 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 2 months ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago