xchwarze / CainLinks
Password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks and more!
☆605Updated 3 weeks ago
Alternatives and similar repositories for Cain
Users that are interested in Cain are comparing it to the libraries listed below
Sorting:
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,449Updated last year
- GUI frontend to John the Ripper password cracker☆612Updated 2 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,230Updated 3 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆535Updated last year
- RockYou2021.txt is a MASSIVE WORDLIST compiled of various other wordlists. RockYou2021.txt DOES NOT CONTAIN USER:PASS logins!☆990Updated last year
- Ncrack network authentication tool☆1,187Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,307Updated 4 years ago
- zerosum0x0's Koadic☆332Updated 4 years ago
- WiFi Penetration Testing Guide☆661Updated 2 years ago
- Netdiscover, ARP Scanner (official repository)☆366Updated 5 months ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆843Updated 8 months ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆628Updated last year
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆351Updated last year
- Kraken: A multi-platform distributed brute-force password cracking system☆327Updated 2 years ago
- Mirror for rockyou.txt☆220Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,404Updated 2 weeks ago
- Automated WPA/WPA2 PSK attack tool.☆618Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,791Updated this week
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆418Updated 2 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆336Updated last year
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,488Updated 2 years ago
- Hydra Password Cracking Cheetsheet☆414Updated 5 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,591Updated 4 years ago
- Small utilities that are useful in advanced password cracking☆1,535Updated 2 months ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆912Updated last year
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆140Updated 3 months ago
- MDK4☆753Updated last year
- Starkiller is a Frontend for PowerShell Empire.☆1,607Updated last month
- DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers.☆156Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,894Updated 2 years ago