Unic0rn28 / hashcat-rulesLinks
☆99Updated 2 years ago
Alternatives and similar repositories for hashcat-rules
Users that are interested in hashcat-rules are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆102Updated 7 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆129Updated last year
- Updated version of n0kovo's Rule List☆35Updated 3 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 5 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆115Updated last week
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 9 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆105Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆104Updated last year
- Everything and anything related to password spraying☆142Updated last year
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆147Updated 9 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- ☆170Updated 4 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆22Updated 2 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- Detect common NFS server misconfigurations☆62Updated 2 months ago
- ☆45Updated last year
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- Polymorphic Command & Control☆86Updated 5 months ago
- Script to perform some hashcracking logic automagically☆73Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 3 years ago
- Crack Everything for CrackMapExec version 6☆20Updated last year
- ☆55Updated last year
- sturdy-chainsaw☆64Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆110Updated 8 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 4 months ago