Unic0rn28 / hashcat-rules
☆91Updated 2 years ago
Alternatives and similar repositories for hashcat-rules:
Users that are interested in hashcat-rules are comparing it to the libraries listed below
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆94Updated 4 months ago
- PowerShell Obfuscator☆168Updated 10 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆108Updated 3 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆33Updated 5 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 8 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆32Updated 9 months ago
- Updated version of n0kovo's Rule List☆25Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆95Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆137Updated 3 weeks ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 7 months ago
- Various wordlists☆59Updated 3 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆102Updated this week
- Automate Scoping, OSINT and Recon assessments.☆95Updated 2 months ago
- Generate graphs and charts based on password cracking result☆159Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆87Updated last year
- ☆17Updated 11 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆42Updated last month
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆101Updated last year
- ☆56Updated last month
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 8 months ago
- Make everyone in your VLAN ASRep roastable☆186Updated last month
- sturdy-chainsaw☆57Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆69Updated 6 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆82Updated last year
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆111Updated 2 weeks ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆99Updated 5 months ago
- Windows priviledge escalation script☆13Updated 2 months ago
- A cheatsheet for NetExec☆115Updated 2 months ago