stealthsploit / Optimised-hashcat-RuleLinks
OneRuleToRuleThemAll... hashcat optimised rule
☆96Updated 6 months ago
Alternatives and similar repositories for Optimised-hashcat-Rule
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
Sorting:
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆118Updated 4 years ago
- 👹☆56Updated 3 years ago
- ☆150Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- parse nmap files☆149Updated 3 weeks ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆65Updated last year
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆72Updated 6 years ago
- brute-forcing su for fun and possibly profit☆92Updated 6 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆189Updated 5 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆486Updated last year
- ☆18Updated 4 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Updated 7 years ago
- large hashcat rulesets generated from real-world compromised passwords☆396Updated 4 years ago
- A python based blind SQL injection exploitation script☆136Updated 5 years ago
- Creates and sends fake meeting invite☆64Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆45Updated 10 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆198Updated last month