stealthsploit / Optimised-hashcat-RuleLinks
OneRuleToRuleThemAll... hashcat optimised rule
☆97Updated 8 months ago
Alternatives and similar repositories for Optimised-hashcat-Rule
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
Sorting:
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- ☆151Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- 👹☆56Updated 4 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆191Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆43Updated last year
- notes 2016-present☆44Updated 5 years ago
- Machine-learn password mangling rules☆113Updated 2 years ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- My Password Cracking Methodology☆82Updated 2 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 3 weeks ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆74Updated 6 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- Various scripts for penetration testing☆145Updated 6 months ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 6 years ago
- Password list generator for password spraying - prebaked with goodies☆105Updated 2 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆236Updated last year
- parse nmap files☆153Updated 2 months ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 5 months ago
- BloodHound Docker Ready to Use☆89Updated 2 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Updated 8 years ago
- Scripts to execute enumeration via LFI☆89Updated 6 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- A Linux enumeration script for Hack The Box☆191Updated 5 years ago