stealthsploit / Optimised-hashcat-Rule
OneRuleToRuleThemAll... hashcat optimised rule
☆86Updated last month
Alternatives and similar repositories for Optimised-hashcat-Rule:
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆84Updated 3 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆63Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- ☆148Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆62Updated 11 months ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆68Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆139Updated 3 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆184Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆116Updated 7 months ago
- BloodHound Docker Ready to Use☆87Updated last year
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆168Updated 3 years ago
- My Password Cracking Methodology☆80Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 3 years ago
- Windows Kernel Exploits☆65Updated 7 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆147Updated 3 weeks ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆468Updated 6 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆127Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆100Updated last year
- parse nmap files☆144Updated 11 months ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆90Updated 10 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆191Updated 3 months ago
- Changes for Visual Studio 2013☆114Updated 9 years ago
- Merges multiple .nessus files into one file.☆44Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆141Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆220Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆44Updated 9 years ago