Cynosureprime / chasmLinks
A CHaracter Aware Splitting Method for producing password candidates.
☆43Updated 7 years ago
Alternatives and similar repositories for chasm
Users that are interested in chasm are comparing it to the libraries listed below
Sorting:
- Detect & filter duplicate hashcat rules☆47Updated 11 months ago
- Random Hashcat Scrips☆33Updated last year
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆63Updated 12 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- ☄️ go-out - A Golang egress buster.☆126Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Updated 9 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆91Updated last year
- ☆28Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- Content from THOTCON 0xa talk☆10Updated 6 years ago
- hashgen - the blazingly fast hash generator☆39Updated last week
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- The Cloud Blocker☆108Updated 10 months ago
- A collection of hashcat-hcstat files☆33Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Collection of rules and debug data for hashcat☆23Updated 2 weeks ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- ☆39Updated 10 months ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Updated 13 years ago
- ☆37Updated 5 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Updated 3 years ago