PlumLulz / hashes.com-cli
Command line interface to interact with hashes.com escrow service.
☆36Updated this week
Alternatives and similar repositories for hashes.com-cli:
Users that are interested in hashes.com-cli are comparing it to the libraries listed below
- hashgen - the blazingly fast hash generator☆28Updated 2 months ago
- Dump of all my hash-cracking related stuffs.☆23Updated 5 years ago
- Simple Script to query hash databases APIs☆16Updated 6 years ago
- Haschcat Rules processor☆13Updated last year
- URL Spider - web crawler and wordlist / ngram generator☆12Updated last month
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆24Updated 6 years ago
- Hash cracking WebApp & Server for hashcat☆45Updated 2 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆37Updated 3 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆57Updated 6 months ago
- Detect & filter duplicate hashcat rules☆42Updated last month
- Dehashed API CLI☆20Updated 4 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆86Updated last month
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆18Updated last year
- Python3 script to dump breach data from Dehashed☆24Updated 6 months ago
- Python port of Pipal for password analytics☆22Updated last year
- Various wordlists☆59Updated last month
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆85Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆32Updated 3 months ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆59Updated 3 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆17Updated 5 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆24Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Top password lists generated from leaks collected from different paste sites☆30Updated 2 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆29Updated 7 months ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- Port Crawler Pythonized☆18Updated 2 years ago