stealthsploit / OneRuleToRuleThemStillLinks
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆585Updated last year
Alternatives and similar repositories for OneRuleToRuleThemStill
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
Sorting:
- Rule for hashcat or john. Aiming to crack how people generate their password☆458Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆399Updated 5 years ago
- A mostly-serverless distributed hash cracking platform☆653Updated last month
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆356Updated last week
- Dirty python script to munge dictionary words into password.☆72Updated last month
- Pentest Report Generator☆444Updated 3 months ago
- Various wordlists FR & EN - Cracking French passwords☆310Updated this week
- A web front-end for password cracking and analytics☆387Updated this week
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆179Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,277Updated 4 months ago
- Aliases and scripts to make common tasks easier.☆169Updated last year
- Kerberoast with ACL abuse capabilities☆603Updated last year
- ☆286Updated 11 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,263Updated last week
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆149Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆668Updated 3 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆137Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- Pentester's Promiscuous Notebook☆528Updated this week
- Create a list of possible usernames for bruteforcing☆82Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆599Updated last month
- Dumping DPAPI credz remotely☆1,310Updated 10 months ago
- ☆133Updated 2 years ago
- ☆118Updated 3 years ago
- Ansible Scripts to Build Out My Parrot☆229Updated 11 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆847Updated this week
- In-depth ldap enumeration utility☆551Updated 3 weeks ago
- The Havoc Framework☆63Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,322Updated 4 months ago
- Compiled tools for internal assessments☆369Updated last week