Unic0rn28 / hashcat-rulesLinks
☆105Updated 2 years ago
Alternatives and similar repositories for hashcat-rules
Users that are interested in hashcat-rules are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆109Updated 9 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆131Updated last year
- Updated version of n0kovo's Rule List☆37Updated 4 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 10 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 7 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated last month
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆154Updated 11 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated this week
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆58Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆111Updated 9 months ago
- Script to perform some hashcracking logic automagically☆75Updated 3 weeks ago
- ☆44Updated last year
- ☆171Updated 5 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆108Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆29Updated last year
- sturdy-chainsaw☆65Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆117Updated last month
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆84Updated 2 weeks ago
- Windows priviledge escalation script☆12Updated 7 months ago
- Crack Everything for CrackMapExec version 6☆20Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆98Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆122Updated 5 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆122Updated 2 weeks ago
- A solution to create obfuscated reverse shells for PowerShell.☆80Updated 3 years ago