stealthsploit / HashcatalystLinks
Hashcat wrapper for attack chain automation and enhanced wordlist generation
☆28Updated 4 months ago
Alternatives and similar repositories for Hashcatalyst
Users that are interested in Hashcatalyst are comparing it to the libraries listed below
Sorting:
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 5 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Updated last month
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 2 months ago
- A little cheatsheet for NetExec☆32Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 11 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆42Updated 8 months ago
- Top hashpwn rules☆21Updated last month
- Updated version of n0kovo's Rule List☆44Updated last week
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 2 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆56Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- tool for identifying guest relationships between companies☆102Updated last year
- ☆37Updated 5 years ago
- A user enumeration tool for Slack.☆35Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Updated last month
- A public, open source physical security methodology☆47Updated last year
- a markov based rule generator for hashcat/mdxfind/jtr☆24Updated last month
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Updated last year
- hashgen - the blazingly fast hash generator☆40Updated 2 weeks ago
- Vast.ai Password Kracking☆92Updated 3 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated last month
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- DEFCON 31 slide deck and video link☆66Updated 8 months ago