stealthsploit / Optimised-hashcat-RuleLinks
OneRuleToRuleThemAll... hashcat optimised rule
☆97Updated 9 months ago
Alternatives and similar repositories for Optimised-hashcat-Rule
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
Sorting:
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated 2 years ago
- ☆153Updated 2 years ago
- BloodHound Docker Ready to Use☆89Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆45Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆81Updated last year
- Machine-learn password mangling rules☆113Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆192Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆105Updated 2 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆262Updated 2 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆74Updated 6 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Reverse Shell-able Windows exploits short POCs.☆32Updated 4 years ago
- large hashcat rulesets generated from real-world compromised passwords☆398Updated 4 years ago
- ☆53Updated 2 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- Team hashcat event writeups and tools☆51Updated last month
- 👹☆56Updated 4 years ago
- Extract credentials and other useful info from network captures☆73Updated 2 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆65Updated last year
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆236Updated last year