[deprecated] see README
☆42May 15, 2020Updated 5 years ago
Alternatives and similar repositories for rulesfinder
Users that are interested in rulesfinder are comparing it to the libraries listed below
Sorting:
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- ☆16Sep 26, 2016Updated 9 years ago
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- ☆13Apr 22, 2015Updated 10 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- VK face grabber☆14Oct 12, 2021Updated 4 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 6 years ago
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 10 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- OpenGL interactive Hilbert curve IPv4 Heatmap☆20Mar 18, 2023Updated 2 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- PHP extension for web-application dynamic analysis.☆27Sep 21, 2018Updated 7 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- MD5 collision testing☆17Nov 24, 2024Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- A Game of Life simulator written in Bash☆19Apr 29, 2013Updated 12 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.☆29Feb 15, 2026Updated 2 weeks ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Password analysis software☆38Jun 24, 2015Updated 10 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- Attempt to Reverse Engineer the Thinkpad DOSFLASH utility☆27Jun 6, 2018Updated 7 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Jan 5, 2026Updated last month
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Sep 29, 2014Updated 11 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆39Aug 29, 2023Updated 2 years ago