Password list character frequency analyzer that can output hashcat masks
☆16May 22, 2019Updated 6 years ago
Alternatives and similar repositories for panalyzer
Users that are interested in panalyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- A quick python script to analyze a given set of passwords and give you some statistics. Used for identifying the most effective hashcat r…☆18Aug 24, 2017Updated 8 years ago
- ☆15Jan 10, 2018Updated 8 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- ☆14Sep 8, 2024Updated last year
- ☆20Oct 14, 2013Updated 12 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆37Nov 25, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Encode and decode pairs of surrogate characters in Python 3☆10Mar 9, 2022Updated 4 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Oct 7, 2013Updated 12 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Mar 20, 2019Updated 7 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- Keep a local IMAP mirror, painlessly☆15Nov 6, 2021Updated 4 years ago
- ☆18Mar 14, 2023Updated 3 years ago
- Event Data Collector☆40Mar 23, 2026Updated last month
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- A VHDL implementation of SipHash☆13Feb 19, 2015Updated 11 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago