Unic0rn28 / hashcat-rules
☆93Updated 2 years ago
Alternatives and similar repositories for hashcat-rules:
Users that are interested in hashcat-rules are comparing it to the libraries listed below
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆96Updated 4 months ago
- Updated version of n0kovo's Rule List☆25Updated this week
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆105Updated 3 weeks ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆110Updated 3 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆33Updated 10 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆33Updated 6 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated 9 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 2 months ago
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- Continuous password spraying tool☆183Updated 2 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆168Updated 11 months ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- ☆164Updated last month
- sturdy-chainsaw☆57Updated last year
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆87Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆101Updated last year
- Crack Everything for CrackMapExec version 6☆18Updated 10 months ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆77Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆141Updated last month
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆128Updated 6 months ago
- Everything and anything related to password spraying☆134Updated 11 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆101Updated 6 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆47Updated 10 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆154Updated 3 months ago
- Make everyone in your VLAN ASRep roastable☆190Updated 2 months ago
- ☆58Updated 2 months ago
- A cheatsheet for NetExec☆119Updated 3 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago