stealthsploit / OneRuleToRuleThemStillLinks
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆570Updated last year
Alternatives and similar repositories for OneRuleToRuleThemStill
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
Sorting:
- Rule for hashcat or john. Aiming to crack how people generate their password☆455Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆398Updated 5 years ago
- A mostly-serverless distributed hash cracking platform☆628Updated 2 weeks ago
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆333Updated this week
- Various wordlists FR & EN - Cracking French passwords☆301Updated last week
- Dirty python script to munge dictionary words into password.☆71Updated last year
- Pentest Report Generator☆437Updated last month
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,254Updated last week
- Kerberoast with ACL abuse capabilities☆587Updated 11 months ago
- Dumping DPAPI credz remotely☆1,282Updated 8 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆575Updated 7 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆656Updated last month
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆403Updated 10 months ago
- Aliases and scripts to make common tasks easier.☆165Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,258Updated 3 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,281Updated 2 months ago
- Create a list of possible usernames for bruteforcing☆81Updated last year
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆151Updated last year
- A web front-end for password cracking and analytics☆385Updated last month
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆134Updated last year
- Pentester's Promiscuous Notebook☆523Updated 3 weeks ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,240Updated 8 months ago
- Compiled tools for internal assessments☆363Updated last week
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆522Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆823Updated 2 months ago
- ☆270Updated 10 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆157Updated 4 months ago
- In-depth ldap enumeration utility☆540Updated 3 weeks ago
- Dominate Active Directory with PowerShell.☆1,131Updated 2 weeks ago