synacktiv / rulesfinderLinks
Machine-learn password mangling rules
☆113Updated 2 years ago
Alternatives and similar repositories for rulesfinder
Users that are interested in rulesfinder are comparing it to the libraries listed below
Sorting:
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- Detect & filter duplicate hashcat rules☆47Updated 10 months ago
- ☆37Updated 5 years ago
- OneRuleToRuleThemAll... hashcat optimised rule☆100Updated 11 months ago
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Updated 3 months ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆67Updated last year
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆192Updated 5 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆83Updated 2 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- Password Breach API Server☆88Updated 4 months ago
- A dockerized, improved version of the Impacket smbserver.py☆40Updated 6 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- ☄️ go-out - A Golang egress buster.☆128Updated last year
- Automated 802.1x Bypass☆86Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- ☆38Updated 9 months ago
- A CHaracter Aware Splitting Method for producing password candidates.☆42Updated 7 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆189Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Updated 8 months ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- ☆154Updated last month
- ☆108Updated 4 years ago