stealthsploit / OneRuleToRuleThemStillLinks
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆492Updated 8 months ago
Alternatives and similar repositories for OneRuleToRuleThemStill
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
Sorting:
- large hashcat rulesets generated from real-world compromised passwords☆396Updated 4 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆437Updated 9 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆128Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,124Updated 3 weeks ago
- A mostly-serverless distributed hash cracking platform☆592Updated 3 weeks ago
- Kerberoast with ACL abuse capabilities☆501Updated 6 months ago
- Pentest Report Generator☆410Updated 2 weeks ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,169Updated last year
- ☆97Updated 2 years ago
- Dumping DPAPI credz remotely☆1,146Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆577Updated 7 months ago
- Active Directory Auditing and Enumeration☆459Updated last week
- Dominate Active Directory with PowerShell.☆985Updated 3 weeks ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,158Updated last month
- ☆211Updated 4 years ago
- Aliases and scripts to make common tasks easier.☆145Updated 9 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆98Updated 6 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆125Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆616Updated 7 months ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆890Updated 7 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆374Updated last year
- Just another Powerview alternative but on steroids☆726Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆208Updated 5 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆757Updated 2 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆322Updated last year
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆144Updated last year
- ☆315Updated 3 months ago
- Pentester's Promiscuous Notebook☆497Updated 2 weeks ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,126Updated 3 months ago