Dump of all my hash-cracking related stuffs.
☆23May 16, 2019Updated 6 years ago
Alternatives and similar repositories for Hash-Cracking
Users that are interested in Hash-Cracking are comparing it to the libraries listed below
Sorting:
- ☆18Mar 14, 2023Updated 2 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Feb 23, 2026Updated last week
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Updated version of n0kovo's Rule List☆44Jan 29, 2026Updated last month
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 7 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Command line interface to interact with hashes.com escrow service.☆44Feb 10, 2026Updated 3 weeks ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Research into the lack of padding for responses in pwned passwords☆11Feb 11, 2020Updated 6 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Most common AWS S3 bucket names.☆29Jun 2, 2020Updated 5 years ago
- ☆12Oct 5, 2025Updated 4 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- Assorted Python☆15Sep 6, 2024Updated last year
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 3 weeks ago
- Demeuk is a simple tool to clean up corpora (like dictionaries) or any dataset containing plain text strings.☆21Aug 6, 2025Updated 6 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Go implementation of scrypt and yescrypt key derivation and password hashing functions☆17Aug 21, 2024Updated last year
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 3 weeks ago
- Custom hashcat kernel for new Metamask Vaults☆18Dec 12, 2025Updated 2 months ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 2 months ago