Dump of all my hash-cracking related stuffs.
☆23May 16, 2019Updated 6 years ago
Alternatives and similar repositories for Hash-Cracking
Users that are interested in Hash-Cracking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- ☆18Mar 14, 2023Updated 3 years ago
- Command line interface to interact with hashes.com escrow service.☆44Mar 12, 2026Updated last week
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated last week
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Various wordlists☆74Dec 12, 2025Updated 3 months ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated last week
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆95Jul 28, 2024Updated last year
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆30Nov 13, 2020Updated 5 years ago
- Tools to recover, extract and decrypt metamask wallets☆25Mar 12, 2026Updated last week
- ☆18Jul 3, 2020Updated 5 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Go implementation of scrypt and yescrypt key derivation and password hashing functions☆17Aug 21, 2024Updated last year
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- ☆12Oct 5, 2025Updated 5 months ago
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 3 months ago
- simple way to change colors☆20May 22, 2020Updated 5 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Most common AWS S3 bucket names.☆29Jun 2, 2020Updated 5 years ago
- Assorted Python☆15Sep 6, 2024Updated last year
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago