stealthsploit / OneRuleToRuleThemStill
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆475Updated 6 months ago
Alternatives and similar repositories for OneRuleToRuleThemStill:
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
- large hashcat rulesets generated from real-world compromised passwords☆395Updated 4 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆436Updated 8 months ago
- Compiled tools for internal assessments☆283Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆547Updated 5 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆569Updated 5 months ago
- Pentester's Promiscuous Notebook☆491Updated this week
- Powershell tool to automate Active Directory enumeration.☆1,101Updated last month
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆416Updated last month
- ☆425Updated 8 months ago
- A mostly-serverless distributed hash cracking platform☆568Updated 2 weeks ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- ☆208Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,125Updated 11 months ago
- Kerberoast with ACL abuse capabilities☆452Updated 4 months ago
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆954Updated this week
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆869Updated 5 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,030Updated 6 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆746Updated last month
- Python version of the C# tool for "Shadow Credentials" attacks☆714Updated 2 weeks ago
- Active Directory Auditing and Enumeration☆450Updated last week
- Windows Local Privilege Escalation from Service Account to System☆797Updated 5 years ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,163Updated last week
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆143Updated last year
- Dumping DPAPI credz remotely☆1,114Updated last month
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆208Updated 5 years ago
- Pentest Report Generator☆407Updated last week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,078Updated last month
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆329Updated 6 months ago
- ☆213Updated 10 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆300Updated last year