0xVavaldi / ruleprocessorYLinks
Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat
☆36Updated 11 months ago
Alternatives and similar repositories for ruleprocessorY
Users that are interested in ruleprocessorY are comparing it to the libraries listed below
Sorting:
- Updated version of n0kovo's Rule List☆37Updated 5 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆96Updated 3 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆118Updated 10 months ago
- hashgen - the blazingly fast hash generator☆38Updated 2 weeks ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated last month
- Detect & filter duplicate hashcat rules☆47Updated 9 months ago
- ☆37Updated 5 years ago
- Collection of hashcat lists and things.☆52Updated 5 years ago
- ☆111Updated 3 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆22Updated last week
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆133Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated 2 weeks ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆65Updated last year
- Custom rules by cyclone☆15Updated 3 months ago
- Top hashpwn rules☆21Updated 11 months ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆12Updated 2 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Updated 6 years ago
- Script to perform some hashcracking logic automagically☆76Updated 2 months ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- FETCH THE PASSWORD STRETCHER☆39Updated 2 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆39Updated last year
- Yet Another LinkedIn Scraper☆33Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆54Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Various wordlists☆68Updated 10 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆41Updated last year
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- Password list generator for password spraying - prebaked with goodies☆106Updated 2 years ago