mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-25 03:51:37 +01:00
fixed readme
This commit is contained in:
parent
305492a3ee
commit
0daff1b3d8
@ -1,3 +1,4 @@
|
|||||||
|
|
||||||
## Other Penetration-Testing related scripts and tools
|
## Other Penetration-Testing related scripts and tools
|
||||||
|
|
||||||
|
|
||||||
@ -7,13 +8,14 @@
|
|||||||
|
|
||||||
- **`correlateCrackedHashes.py`** - Hashcat results correlation utility.
|
- **`correlateCrackedHashes.py`** - Hashcat results correlation utility.
|
||||||
Takes two files on input. Tries to find every line of the second file within the first file and for every found match - extracts password value from the second file's line. Then prints these correlations.
|
Takes two files on input. Tries to find every line of the second file within the first file and for every found match - extracts password value from the second file's line. Then prints these correlations.
|
||||||
In other words - having the following in FileA:
|
|
||||||
|
In other words - having the following in FileA:
|
||||||
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c`
|
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c`
|
||||||
|
|
||||||
and a line in FileB that would be a result of running hashcat:
|
and a line in FileB that would be a result of running hashcat:
|
||||||
`68eacb97d86f0c4621fa2b0e17cabd8c:Test123`
|
`68eacb97d86f0c4621fa2b0e17cabd8c:Test123`
|
||||||
|
|
||||||
the script will print out:
|
the script will print out:
|
||||||
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c,Test123`
|
`some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c,Test123`
|
||||||
|
|
||||||
- **`encrypt.rb`** - Simple File Encryption utility (with support for Blowfish, GOST, IDEA, AES) capable of encrypting directories. ([gist](https://gist.github.com/mgeeky/751c01c4dac99871f4da))
|
- **`encrypt.rb`** - Simple File Encryption utility (with support for Blowfish, GOST, IDEA, AES) capable of encrypting directories. ([gist](https://gist.github.com/mgeeky/751c01c4dac99871f4da))
|
||||||
@ -52,3 +54,4 @@ Kali
|
|||||||
```
|
```
|
||||||
|
|
||||||
- **`xor-key-recovery.py`** - Simple XOR brute-force Key recovery script - given a cipher text, plain text and key length - it searches for proper key that could decrypt cipher into text. ([gist](https://gist.github.com/mgeeky/589b2cf781901288dfea0894a780ff98))
|
- **`xor-key-recovery.py`** - Simple XOR brute-force Key recovery script - given a cipher text, plain text and key length - it searches for proper key that could decrypt cipher into text. ([gist](https://gist.github.com/mgeeky/589b2cf781901288dfea0894a780ff98))
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user