OneRuleToRuleThemAll... hashcat optimised rule
☆110Dec 16, 2024Updated last year
Alternatives and similar repositories for Optimised-hashcat-Rule
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
Sorting:
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,606Dec 9, 2021Updated 4 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- A new web frontend for Hashtopolis☆42Updated this week
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆617Oct 16, 2024Updated last year
- Soundcard RFID decoder for 125KHZ HID cards.☆27Apr 2, 2016Updated 9 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Aug 4, 2016Updated 9 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- ☆190Nov 21, 2024Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- NSEC3 Zone Walker☆12Nov 27, 2025Updated 3 months ago
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- GPU is unfriendly for WebDollar - argon2-gpu for WebDollar☆14Aug 17, 2018Updated 7 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago