☆31Nov 22, 2021Updated 4 years ago
Alternatives and similar repositories for analytic-password-cracking
Users that are interested in analytic-password-cracking are comparing it to the libraries listed below
Sorting:
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- A Security Analysis of Honeywords☆16Nov 28, 2017Updated 8 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆15Sep 6, 2021Updated 4 years ago
- A framework for password-strength evaluation☆14Sep 26, 2020Updated 5 years ago
- ☆18Mar 14, 2023Updated 2 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Prototype private key hashing agent☆16Jan 8, 2018Updated 8 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Password attack and defense using deep neural networks☆23Aug 3, 2022Updated 3 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- A new kind of password vault that fools the brute-force attacker by charning out decoy passwords.☆26Apr 30, 2021Updated 4 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Feb 28, 2026Updated last week
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Code for cracking passwords with neural networks☆242Dec 2, 2019Updated 6 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Updated this week
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A diagram with the adoption status of FIDO2 and WebAuthn☆25Mar 22, 2019Updated 6 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆330Jul 11, 2019Updated 6 years ago