Unic0rn28 / hashcat-rules
☆84Updated 2 years ago
Alternatives and similar repositories for hashcat-rules:
Users that are interested in hashcat-rules are comparing it to the libraries listed below
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆88Updated 2 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆120Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆97Updated 6 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 7 months ago
- Generate graphs and charts based on password cracking result☆156Updated 2 years ago
- Updated version of n0kovo's Rule List☆25Updated 3 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 2 weeks ago
- sturdy-chainsaw☆53Updated last year
- ☆72Updated 9 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆32Updated 3 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆145Updated last week
- Windows priviledge escalation script☆13Updated 2 weeks ago
- A collection of tools that I use in CTF's or for assessments☆89Updated 2 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- Polymorphic Command & Control☆65Updated 4 months ago
- Various wordlists☆59Updated 2 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆98Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆68Updated 4 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Script to perform some hashcracking logic automagically☆67Updated 9 months ago
- Azure Service Subdomain Enumeration☆52Updated 5 months ago
- ☆42Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆158Updated 8 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 5 months ago
- ☆53Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆93Updated 3 months ago
- Collection of extra pentest tools for Kali Linux☆102Updated last year