Hashcat wrapper to help automate the cracking process
☆120Apr 16, 2018Updated 7 years ago
Alternatives and similar repositories for autocrack
Users that are interested in autocrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Dec 7, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Convert TI SmartRF Bluetooth Low Energy Packet Captures to Libpcap Format☆18Dec 11, 2014Updated 11 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- ☆21Apr 16, 2023Updated 2 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Apr 7, 2023Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 3 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- Remote agent used for processing distributed jobs☆15Dec 15, 2021Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- Create Password lists for cracking lyrical passwords☆17May 11, 2024Updated last year
- A Python/Scapy based ARP Cache Poisoning tool.☆12Apr 3, 2016Updated 9 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- A collection of scripts I use with hashcat☆21Nov 28, 2016Updated 9 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- autocrack adds queue support for hashcat cracking.☆41Mar 16, 2023Updated 3 years ago
- Hashcat Bash Scripts for bulk hash file processing☆52Jul 2, 2016Updated 9 years ago
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆64Aug 27, 2019Updated 6 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- Turn Ducky Scripts into QMK ready SEND_STRING() macros☆19Nov 14, 2019Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago