stealthsploit / OneRuleToRuleThemStillLinks
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆502Updated 9 months ago
Alternatives and similar repositories for OneRuleToRuleThemStill
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
Sorting:
- Rule for hashcat or john. Aiming to crack how people generate their password☆441Updated 10 months ago
- large hashcat rulesets generated from real-world compromised passwords☆396Updated 4 years ago
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆275Updated 2 months ago
- A mostly-serverless distributed hash cracking platform☆599Updated last month
- Pentest Report Generator☆412Updated last month
- A web front-end for password cracking and analytics☆380Updated 2 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆585Updated 8 months ago
- The Havoc Framework☆58Updated 2 years ago
- ☆429Updated 10 months ago
- ☆99Updated 2 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆129Updated last year
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆619Updated 8 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆333Updated 8 months ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆399Updated 5 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆521Updated 2 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆145Updated last year
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆145Updated last year
- Aliases and scripts to make common tasks easier.☆145Updated 10 months ago
- In-depth ldap enumeration utility☆488Updated 3 weeks ago
- Dirty python script to munge dictionary words into password.☆69Updated 7 months ago
- Dumping DPAPI credz remotely☆1,162Updated 3 months ago
- ☆218Updated 4 years ago
- Pentester's Promiscuous Notebook☆498Updated last month
- Various wordlists FR & EN - Cracking French passwords☆288Updated this week
- ☆325Updated 4 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆209Updated 5 years ago
- Kerberoast with ACL abuse capabilities☆512Updated 7 months ago
- Powershell tool to automate Active Directory enumeration.☆1,134Updated last month
- Compiled tools for internal assessments☆336Updated this week
- Create a list of possible usernames for bruteforcing☆68Updated last year