stealthsploit / Optimised-hashcat-Rule
OneRuleToRuleThemAll... hashcat optimised rule
☆94Updated 4 months ago
Alternatives and similar repositories for Optimised-hashcat-Rule:
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆187Updated 4 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆194Updated 2 months ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆395Updated 4 years ago
- Protocol agnostic online password guessing API.☆80Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆161Updated last month
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- parse nmap files☆149Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆481Updated 10 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆172Updated 4 years ago
- Test tool for CVE-2020-1472☆34Updated last year
- Simple script to generate commands to achieve reverse shells.☆117Updated 4 years ago
- Scripts featured in the book How to Hack Like a Legend☆139Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆299Updated last year
- Modular Enumeration and Password Spraying Framework☆118Updated last year
- BloodHound Docker Ready to Use☆90Updated last year
- Password spraying tool and Bloodhound integration☆231Updated 3 months ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated last year
- ☆150Updated last year
- brute-forcing su for fun and possibly profit☆91Updated 5 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆277Updated last year
- ☆29Updated 4 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆66Updated 6 years ago
- My Password Cracking Methodology☆81Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- ☆81Updated 4 years ago