stealthsploit / Optimised-hashcat-Rule
OneRuleToRuleThemAll... hashcat optimised rule
☆95Updated 5 months ago
Alternatives and similar repositories for Optimised-hashcat-Rule
Users that are interested in Optimised-hashcat-Rule are comparing it to the libraries listed below
Sorting:
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆118Updated 4 years ago
- My Password Cracking Methodology☆82Updated 2 years ago
- large hashcat rulesets generated from real-world compromised passwords☆395Updated 4 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆187Updated 4 years ago
- ☆150Updated last year
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆78Updated last year
- Some of the best web shells that you might need☆45Updated 6 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆165Updated last month
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- A set of recipes useful in pentesting and red teaming scenarios☆143Updated last year
- parse nmap files☆150Updated last year
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆64Updated last year
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Miscellaneous scripts for pentesting☆220Updated 7 years ago
- ☆29Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆70Updated 6 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- BloodHound Docker Ready to Use☆90Updated last year
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆195Updated this week
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆242Updated last month
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆280Updated last year
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆172Updated 4 years ago
- Test tool for CVE-2020-1472☆34Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆482Updated 10 months ago