stealthsploit / OneRuleToRuleThemStillLinks
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆564Updated last year
Alternatives and similar repositories for OneRuleToRuleThemStill
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
Sorting:
- Rule for hashcat or john. Aiming to crack how people generate their password☆456Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆398Updated 4 years ago
- Pentest Report Generator☆433Updated 3 weeks ago
- A mostly-serverless distributed hash cracking platform☆629Updated last week
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆321Updated 2 weeks ago
- Dirty python script to munge dictionary words into password.☆71Updated 11 months ago
- Kerberoast with ACL abuse capabilities☆580Updated 11 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,267Updated 2 months ago
- Various wordlists FR & EN - Cracking French passwords☆302Updated last week
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,246Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆643Updated 3 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆570Updated 6 months ago
- Aliases and scripts to make common tasks easier.☆163Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆345Updated last year
- A web front-end for password cracking and analytics☆384Updated last week
- Powershell tool to automate Active Directory enumeration.☆1,248Updated 2 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆150Updated last year
- Pentester's Promiscuous Notebook☆520Updated last month
- Create a list of possible usernames for bruteforcing☆77Updated last year
- ☆268Updated 10 years ago
- Compiled tools for internal assessments☆361Updated this week
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆627Updated last week
- Dumping DPAPI credz remotely☆1,272Updated 7 months ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆523Updated last year
- Just another Powerview alternative but on steroids☆825Updated this week
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆133Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- ☆438Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆403Updated 10 months ago
- ☆218Updated 5 years ago