PlumLulz / hashes.com-cli
Command line interface to interact with hashes.com escrow service.
☆37Updated 2 weeks ago
Alternatives and similar repositories for hashes.com-cli:
Users that are interested in hashes.com-cli are comparing it to the libraries listed below
- Dump of all my hash-cracking related stuffs.☆23Updated 5 years ago
- hashgen - the blazingly fast hash generator☆34Updated 2 weeks ago
- Various wordlists☆59Updated 4 months ago
- Hash cracking WebApp & Server for hashcat☆45Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆15Updated last week
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆59Updated 8 months ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- Dehashed API CLI☆20Updated 4 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆33Updated 9 months ago
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Simple Script to query hash databases APIs☆16Updated 6 years ago
- Python3 script to dump breach data from Dehashed☆28Updated 9 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆38Updated 4 years ago
- A collection of scripts I use with hashcat☆21Updated 8 years ago
- Detect & filter duplicate hashcat rules☆43Updated 3 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆94Updated 4 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- Custom rules by cyclone☆13Updated 4 months ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 3 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆86Updated 8 months ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Distillations and expansions on Rocktastic12a☆13Updated 2 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆33Updated 5 months ago
- Top password lists generated from leaks collected from different paste sites☆30Updated 2 years ago
- ☆21Updated 4 years ago