From 0daff1b3d8a27d298facdd12f8018f839a7c9426 Mon Sep 17 00:00:00 2001 From: mgeeky Date: Wed, 4 Mar 2020 16:54:15 +0100 Subject: [PATCH] fixed readme --- others/README.md | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/others/README.md b/others/README.md index 922d09e..5f3750b 100644 --- a/others/README.md +++ b/others/README.md @@ -1,3 +1,4 @@ + ## Other Penetration-Testing related scripts and tools @@ -7,14 +8,15 @@ - **`correlateCrackedHashes.py`** - Hashcat results correlation utility. Takes two files on input. Tries to find every line of the second file within the first file and for every found match - extracts password value from the second file's line. Then prints these correlations. -In other words - having the following in FileA: - `some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c` -and a line in FileB that would be a result of running hashcat: - `68eacb97d86f0c4621fa2b0e17cabd8c:Test123` + In other words - having the following in FileA: + `some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c` -the script will print out: - `some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c,Test123` + and a line in FileB that would be a result of running hashcat: + `68eacb97d86f0c4621fa2b0e17cabd8c:Test123` + + the script will print out: + `some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c,Test123` - **`encrypt.rb`** - Simple File Encryption utility (with support for Blowfish, GOST, IDEA, AES) capable of encrypting directories. ([gist](https://gist.github.com/mgeeky/751c01c4dac99871f4da)) @@ -52,3 +54,4 @@ Kali ``` - **`xor-key-recovery.py`** - Simple XOR brute-force Key recovery script - given a cipher text, plain text and key length - it searches for proper key that could decrypt cipher into text. ([gist](https://gist.github.com/mgeeky/589b2cf781901288dfea0894a780ff98)) +