synacktiv / rulesfinder
Machine-learn password mangling rules
☆107Updated last year
Related projects: ⓘ
- ☆32Updated 3 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆179Updated 4 years ago
- Detect & filter duplicate hashcat rules☆40Updated 2 years ago
- Markov-chains for linguistically-correct password cracking☆61Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆77Updated last year
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆52Updated last month
- A CHaracter Aware Splitting Method for producing password candidates.☆40Updated 6 years ago
- OneRuleToRuleThemAll... hashcat optimised rule☆80Updated 3 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆59Updated 7 months ago
- Evil client portion of EAP relay attack☆186Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆29Updated 4 months ago
- Team hashcat event writeups and tools☆42Updated last week
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆208Updated 3 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆84Updated 2 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆30Updated 2 weeks ago
- Automated 802.1x Bypass☆83Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 3 years ago
- This is a bash script to bypass 802.1x NAC☆94Updated last year
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆61Updated 10 months ago
- Lookup for interesting stuff in SMB shares☆147Updated last year
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- Generate very tiny reverse shell binaries for Linux~☆74Updated 4 years ago
- ☆50Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆103Updated last year
- BloodHound Docker Ready to Use☆84Updated last year
- EagleShell is a high-quality tool that aims to improve your pentest.☆76Updated 3 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆38Updated 5 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆136Updated 4 years ago
- ☆146Updated last year