stealthsploit / Optimised-hashcat-RuleLinks
OneRuleToRuleThemAll... hashcat optimised rule
☆106Updated last year
Alternatives and similar repositories for Optimised-hashcat-Rule
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
Sorting:
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- ☆156Updated 2 months ago
- Tool to identify routers on the local LAN and paths to the Internet☆68Updated 2 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- My Password Cracking Methodology☆82Updated 2 years ago
- Merge multiple nMap xml files into one☆49Updated 6 years ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 5 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆191Updated 5 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Updated 2 years ago
- Markov-chains for linguistically-correct password cracking☆63Updated 3 years ago
- Machine-learn password mangling rules☆115Updated 2 years ago
- Scripts featured in the book How to Hack Like a Legend☆150Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆241Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- A little utility to convert nmap xml results to markdown tables☆71Updated 3 years ago
- 👹☆57Updated 4 years ago
- large hashcat rulesets generated from real-world compromised passwords☆399Updated 5 years ago
- OSCP Cheatsheets☆99Updated 6 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆331Updated 3 weeks ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆108Updated 2 years ago
- Python template to assist with buffer overflows☆72Updated 6 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- ☆48Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated 2 weeks ago
- Reverse Shell-able Windows exploits short POCs.☆35Updated 5 years ago