Guesses hash types, picks some sensible dictionaries and rules for hashcat
☆31Feb 10, 2025Updated last year
Alternatives and similar repositories for hashcrack
Users that are interested in hashcrack are comparing it to the libraries listed below
Sorting:
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Jul 19, 2024Updated last year
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- A history of PGP-related vulnerabilities☆24Jan 13, 2026Updated last month
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Oct 26, 2023Updated 2 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Jun 26, 2024Updated last year
- ☆37Sep 29, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 7 months ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year
- For all your network pentesting needs☆154Jun 26, 2024Updated last year
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆43Jan 14, 2026Updated last month
- The Python book for developers who miss curly braces. Learn real Python while complaining about whitespace. 15 chapters of education, com…☆15Aug 21, 2025Updated 6 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Cura 5.x plugin for including thumbnail/preview images in gcode files for Elegoo Neptune 3 Pro, Plus and Max.☆13May 12, 2023Updated 2 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- Tool to read\parse\export Azure Storage Diagnostic settings logs☆11Mar 2, 2023Updated 3 years ago
- ☆46Aug 15, 2021Updated 4 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Crack passwords using Terraform and AWS☆43Mar 20, 2019Updated 6 years ago
- ☆12May 22, 2018Updated 7 years ago