stealthsploit / Optimised-hashcat-Rule
OneRuleToRuleThemAll... hashcat optimised rule
☆86Updated last month
Alternatives and similar repositories for Optimised-hashcat-Rule:
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆44Updated 9 years ago
- ☆149Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Some of the best web shells that you might need☆45Updated 5 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆183Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Scripts to execute enumeration via LFI☆90Updated 5 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆63Updated last year
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- Test tool for CVE-2020-1472☆34Updated last year
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆30Updated 7 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆138Updated 5 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆168Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- Protocol agnostic online password guessing API.☆80Updated last year
- ☆51Updated 6 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆64Updated 5 years ago
- ☆18Updated 4 years ago
- Password list generator for password spraying - prebaked with goodies☆101Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- parse nmap files☆146Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A set of recipes useful in pentesting and red teaming scenarios☆142Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆141Updated last month
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago