fixed readme

This commit is contained in:
mgeeky 2020-03-04 16:54:15 +01:00
parent 305492a3ee
commit 0daff1b3d8
1 changed files with 9 additions and 6 deletions

View File

@ -1,3 +1,4 @@
## Other Penetration-Testing related scripts and tools
@ -7,14 +8,15 @@
- **`correlateCrackedHashes.py`** - Hashcat results correlation utility.
Takes two files on input. Tries to find every line of the second file within the first file and for every found match - extracts password value from the second file's line. Then prints these correlations.
In other words - having the following in FileA:
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c`
and a line in FileB that would be a result of running hashcat:
`68eacb97d86f0c4621fa2b0e17cabd8c:Test123`
In other words - having the following in FileA:
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c`
the script will print out:
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c,Test123`
and a line in FileB that would be a result of running hashcat:
`68eacb97d86f0c4621fa2b0e17cabd8c:Test123`
the script will print out:
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c,Test123`
- **`encrypt.rb`** - Simple File Encryption utility (with support for Blowfish, GOST, IDEA, AES) capable of encrypting directories. ([gist](https://gist.github.com/mgeeky/751c01c4dac99871f4da))
@ -52,3 +54,4 @@ Kali
```
- **`xor-key-recovery.py`** - Simple XOR brute-force Key recovery script - given a cipher text, plain text and key length - it searches for proper key that could decrypt cipher into text. ([gist](https://gist.github.com/mgeeky/589b2cf781901288dfea0894a780ff98))