The Wayback Machine - https://web.archive.org/web/20200928194520/https://github.com/topics/password
Skip to content
#

password

Here are 1,949 public repositories matching this topic...

magnumripper
magnumripper commented Sep 26, 2020

* is a wildcard for the format label (eg. office)
# is a wildcard for the format name (eg. 2007/2010/2013
@ is a wildcard for the algorithm name (eg. SHA1 256/256 AVX2 8x / SHA512 256/256 AVX2 4x AES)

These are fine:

$ ../run/john --list=formats --format=raw*
Raw-SHA512, Raw-Blake2, Raw-Keccak, Raw-Keccak-256, Raw-MD4, Raw-MD5, 
Raw-MD5u, Raw-SHA1, Raw-SHA1-AxCrypt, 

大型内网渗透扫描器&Cobalt Strike,Ladon7.2内置94个模块,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、SMBGhost、Weblogic、ActiveMQ、Tomcat、Struts2系列,密码口令爆破(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、Netbios、LDAP、SmbHash、WmiHash、Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0

  • Updated Sep 15, 2020
  • C#
odensc
odensc commented Jun 26, 2019

Hi, I was upgrading my dependencies and saw this module was updated. Since it's v0.x there could be breaking changes with updates - so I went to the Releases tab to look for a changelog, but there's none for v0.24.0.

I see now that you just removed the minimum memory limit, but would you mind adding a changelog to avoid confusion? It's a bit worrying when I don't know what's changed - espec

K8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动

  • Updated Dec 25, 2019
  • Python

Improve this page

Add a description, image, and links to the password topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the password topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.