unix-ninja / hcr
Haschcat Rules processor
☆13Updated last year
Related projects: ⓘ
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking. It facilitates the creation of custom rules and…☆17Updated this week
- Detect & filter duplicate hashcat rules☆40Updated 2 years ago
- wordlists for password cracking☆25Updated 2 years ago
- ☆16Updated 7 years ago
- Random Hashcat Scrips☆19Updated last year
- Assists in mass exportation of Nessus scans☆18Updated 6 years ago
- ☆10Updated this week
- Periodically check hashcat cracking progress and notify of success.☆11Updated 5 years ago
- ☆19Updated this week
- Collection of rules and debug data for hashcat☆16Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆18Updated 5 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Updated 7 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- LetMeOutOfYour.net Resources☆19Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆10Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Screenshot Shenanigans☆24Updated 6 years ago
- Wireless Pentesting Device☆17Updated 4 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- ☆13Updated this week
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆21Updated 5 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- ☆22Updated 3 years ago
- automatic scan for hackthebox☆14Updated 4 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 5 years ago
- ☆12Updated this week
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆13Updated 7 years ago
- Hostile Dropboxes Management☆25Updated 4 years ago