stealthsploit / OneRuleToRuleThemStill
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆392Updated last month
Related projects ⓘ
Alternatives and complementary repositories for OneRuleToRuleThemStill
- large hashcat rulesets generated from real-world compromised passwords☆390Updated 3 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆406Updated 2 months ago
- A web front-end for password cracking and analytics☆360Updated this week
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆186Updated this week
- Powershell tool to automate Active Directory enumeration.☆1,012Updated 4 months ago
- ☆209Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,008Updated 5 months ago
- Pentest Report Generator☆377Updated 2 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆128Updated 8 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆111Updated 11 months ago
- Penelope Shell Handler☆697Updated last month
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆552Updated 2 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆639Updated 6 months ago
- In-depth ldap enumeration utility☆426Updated last week
- A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec☆888Updated 2 months ago
- Automated Active Directory Enumeration☆416Updated this week
- A RedTeam Toolkit☆385Updated last month
- Aliases and scripts to make common tasks easier.☆122Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆195Updated 4 years ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆466Updated 3 months ago
- Compiled tools for internal assessments☆253Updated this week
- ☆413Updated 3 months ago
- Dumping DPAPI credz remotely☆1,011Updated 2 weeks ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆509Updated last month
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated this week
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,023Updated 4 months ago
- ☆493Updated 7 months ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆154Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆141Updated last year