stealthsploit / Optimised-hashcat-RuleLinks
OneRuleToRuleThemAll... hashcat optimised rule
☆106Updated last year
Alternatives and similar repositories for Optimised-hashcat-Rule
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
Sorting:
- ☆156Updated 2 months ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆68Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆191Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- Merge multiple nMap xml files into one☆49Updated 6 years ago
- Password list generator for password spraying - prebaked with goodies☆108Updated 2 years ago
- My Password Cracking Methodology☆82Updated 2 years ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated 2 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- large hashcat rulesets generated from real-world compromised passwords☆399Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- A little utility to convert nmap xml results to markdown tables☆71Updated 3 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Updated 11 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 5 years ago
- Protocol agnostic online password guessing API.☆85Updated 2 years ago
- Scripts featured in the book How to Hack Like a Legend☆150Updated 3 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆81Updated 6 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Updated 2 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- ☆53Updated 3 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆186Updated 2 months ago
- notes 2016-present☆48Updated 5 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆94Updated last year
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆181Updated 4 years ago
- Modular Enumeration and Password Spraying Framework☆129Updated last year