stealthsploit / OneRuleToRuleThemStillLinks
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆486Updated 7 months ago
Alternatives and similar repositories for OneRuleToRuleThemStill
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
Sorting:
- large hashcat rulesets generated from real-world compromised passwords☆396Updated 4 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆436Updated 9 months ago
- A mostly-serverless distributed hash cracking platform☆574Updated last week
- ☆95Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆610Updated 6 months ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆394Updated 4 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆421Updated 2 months ago
- Various wordlists FR & EN - Cracking French passwords☆284Updated this week
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆507Updated 3 weeks ago
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆265Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆564Updated 6 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆332Updated 7 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆126Updated last year
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆975Updated 2 weeks ago
- DPAPI looting remotely and locally in Python☆477Updated 3 weeks ago
- Dumping DPAPI credz remotely☆1,127Updated 2 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆203Updated 10 months ago
- ☆211Updated 4 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆144Updated last year
- Pentester's Promiscuous Notebook☆495Updated last week
- Pentest Report Generator☆409Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆753Updated 2 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆885Updated 2 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,177Updated last month
- Powershell tool to automate Active Directory enumeration.☆1,108Updated 2 months ago
- Active Directory Auditing and Enumeration☆453Updated 3 weeks ago
- ☆217Updated 4 years ago
- A web front-end for password cracking and analytics☆379Updated last month
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆883Updated 6 months ago
- Kerberoast with ACL abuse capabilities☆474Updated 5 months ago