stealthsploit / OneRuleToRuleThemStillLinks
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆535Updated 11 months ago
Alternatives and similar repositories for OneRuleToRuleThemStill
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
Sorting:
- Rule for hashcat or john. Aiming to crack how people generate their password☆449Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆398Updated 4 years ago
- A mostly-serverless distributed hash cracking platform☆614Updated 2 weeks ago
- Pentest Report Generator☆427Updated 3 weeks ago
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆294Updated 5 months ago
- Dirty python script to munge dictionary words into password.☆70Updated 9 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆596Updated 10 months ago
- Various wordlists FR & EN - Cracking French passwords☆291Updated this week
- A web front-end for password cracking and analytics☆382Updated 4 months ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆401Updated 7 months ago
- Aliases and scripts to make common tasks easier.☆154Updated last year
- The Havoc Framework☆59Updated 2 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆131Updated last year
- ☆433Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆550Updated 4 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆145Updated last year
- Pentester's Promiscuous Notebook☆504Updated 2 weeks ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,219Updated last month
- Compiled tools for internal assessments☆356Updated this week
- Dumping DPAPI credz remotely☆1,207Updated 5 months ago
- Powershell tool to automate Active Directory enumeration.☆1,163Updated last week
- In-depth ldap enumeration utility☆513Updated this week
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆336Updated 10 months ago
- Kerberoast with ACL abuse capabilities☆553Updated 9 months ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆154Updated 11 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,236Updated last year
- ☆105Updated 2 years ago
- Useful commands/tricks using smbclient/nmap in a pentesting/auditing/redteaming☆114Updated 3 years ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆519Updated last year
- Create a list of possible usernames for bruteforcing☆76Updated last year