Unic0rn28 / hashcat-rulesLinks
☆111Updated 3 years ago
Alternatives and similar repositories for hashcat-rules
Users that are interested in hashcat-rules are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆126Updated 11 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆133Updated last year
- Updated version of n0kovo's Rule List☆38Updated 6 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Updated last year
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Updated 3 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 2 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆47Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆155Updated 9 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- Script to perform some hashcracking logic automagically☆78Updated last week
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- Windows priviledge escalation script☆12Updated 9 months ago
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- sturdy-chainsaw☆67Updated 2 years ago
- Crack Everything for CrackMapExec version 6☆20Updated last year
- ☆45Updated 2 years ago
- Various wordlists☆69Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆86Updated 2 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Ready to go Phishing Platform☆56Updated last year
- Password list generator for password spraying - prebaked with goodies☆106Updated 2 years ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆115Updated 3 weeks ago
- Azure Service Subdomain Enumeration☆67Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 4 months ago
- ☆46Updated last month
- ☆173Updated 7 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated 10 months ago