Command line interface to interact with hashes.com escrow service.
☆44Mar 12, 2026Updated last week
Alternatives and similar repositories for hashes.com-cli
Users that are interested in hashes.com-cli are comparing it to the libraries listed below
Sorting:
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 3 months ago
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated last week
- ☆37Sep 29, 2020Updated 5 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Feb 28, 2026Updated 2 weeks ago
- Custom hashcat kernel for new Metamask Vaults☆19Dec 12, 2025Updated 3 months ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- ☆18Mar 14, 2023Updated 3 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 3 months ago
- ☆121Oct 27, 2022Updated 3 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Tools to recover, extract and decrypt metamask wallets☆24Mar 12, 2026Updated last week
- Tools to recover, extract and decrypt Phantom wallets☆30Mar 12, 2026Updated last week
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Various wordlists☆74Dec 12, 2025Updated 3 months ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- A tool for reverse engineering Android apk files☆13Nov 30, 2018Updated 7 years ago
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆12Apr 14, 2024Updated last year
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 3 months ago