stealthsploit / OneRuleToRuleThemStill
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆468Updated 6 months ago
Alternatives and similar repositories for OneRuleToRuleThemStill:
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
- large hashcat rulesets generated from real-world compromised passwords☆394Updated 4 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆433Updated 7 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,113Updated 10 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆543Updated 5 months ago
- Pentest Report Generator☆402Updated last week
- Powershell tool to automate Active Directory enumeration.☆1,087Updated 2 weeks ago
- Compiled tools for internal assessments☆280Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆208Updated 5 years ago
- Dumping DPAPI credz remotely☆1,108Updated 3 weeks ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,152Updated last month
- Penelope Shell Handler☆894Updated 3 weeks ago
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆953Updated last month
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆351Updated 2 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆142Updated last year
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,026Updated 5 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,113Updated 9 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,069Updated 3 weeks ago
- a tool to help operate in EDRs' blind spots☆727Updated 4 months ago
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆246Updated last month
- Pentester's Promiscuous Notebook☆488Updated last week
- ☆425Updated 7 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆149Updated 2 years ago
- Active Directory Auditing and Enumeration☆446Updated last week
- Just another Powerview alternative☆615Updated this week
- A RedTeam Toolkit☆395Updated 2 weeks ago
- Kerberoast with ACL abuse capabilities☆432Updated 4 months ago
- ☆283Updated last month
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆864Updated 5 months ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆156Updated 2 years ago