stealthsploit / Optimised-hashcat-Rule
OneRuleToRuleThemAll... hashcat optimised rule
☆86Updated 3 months ago
Alternatives and similar repositories for Optimised-hashcat-Rule:
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- ☆68Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆117Updated 4 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆65Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- ☆150Updated last year
- My Password Cracking Methodology☆81Updated 2 years ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- CVE-2007-2447 - Samba usermap script☆59Updated 4 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆186Updated 4 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆43Updated 9 years ago
- ☆41Updated 4 years ago
- brute-forcing su for fun and possibly profit☆87Updated 5 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- BloodHound Docker Ready to Use☆88Updated last year
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆75Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆195Updated last month
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆30Updated 7 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆170Updated 3 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆247Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆228Updated 3 years ago
- Powershell crazy and sometimes diabolic scripts☆154Updated 4 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago