stealthsploit / OneRuleToRuleThemStill
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
☆455Updated 5 months ago
Alternatives and similar repositories for OneRuleToRuleThemStill:
Users that are interested in OneRuleToRuleThemStill are comparing it to the libraries listed below
- large hashcat rulesets generated from real-world compromised passwords☆393Updated 4 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆430Updated 6 months ago
- A mostly-serverless distributed hash cracking platform☆564Updated 11 months ago
- Powershell tool to automate Active Directory enumeration.☆1,079Updated last month
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆407Updated last week
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆950Updated 2 weeks ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,103Updated 10 months ago
- Pentest Report Generator☆397Updated last week
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆563Updated 4 months ago
- This is for Ethical Use only! Update:- Currently the payloads can only bypass latest real time monitoring and not cloud based detections,…☆220Updated 2 weeks ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆138Updated last year
- A web front-end for password cracking and analytics☆368Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆534Updated 4 months ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆389Updated 2 months ago
- Compiled tools for internal assessments☆276Updated this week
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,098Updated 8 months ago
- Active Directory Auditing and Enumeration☆436Updated last week
- ☆279Updated 3 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆467Updated 4 months ago
- Penelope Shell Handler☆857Updated last week
- ☆421Updated 7 months ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆287Updated 3 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆690Updated 10 months ago
- ☆215Updated 4 years ago
- A RedTeam Toolkit☆394Updated this week
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆132Updated last month
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆372Updated 4 years ago
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆235Updated 2 weeks ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated 7 months ago
- Scripts featured in the book How to Hack Like a Legend☆138Updated 2 years ago