Command line interface to interact with hashes.com escrow service.
☆44Feb 10, 2026Updated 2 weeks ago
Alternatives and similar repositories for hashes.com-cli
Users that are interested in hashes.com-cli are comparing it to the libraries listed below
Sorting:
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- ☆37Sep 29, 2020Updated 5 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 2 weeks ago
- Custom hashcat kernel for new Metamask Vaults☆18Dec 12, 2025Updated 2 months ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated this week
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆95Jul 28, 2024Updated last year
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- ☆18Mar 14, 2023Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆30Sep 15, 2025Updated 5 months ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Tools to recover, extract and decrypt Phantom wallets☆31Feb 10, 2026Updated 2 weeks ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 6 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 9 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 2 months ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 2 months ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆79Aug 4, 2025Updated 6 months ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Tool for rebasing a PCAP file and editing layer2 and layer 3 addresses☆16Dec 30, 2020Updated 5 years ago
- Random Hashcat Scrips☆36Oct 12, 2024Updated last year
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 2 weeks ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago