Updated version of n0kovo's Rule List
☆45Jan 29, 2026Updated 3 months ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆38Nov 25, 2025Updated 5 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 8 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 5 months ago
- ☆38Sep 29, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- hashgen - the blazingly fast hash generator☆40May 12, 2026Updated last week
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- ☆123Oct 27, 2022Updated 3 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated 2 months ago
- API tool for hashes.com escrow☆12May 2, 2026Updated 2 weeks ago
- Various wordlists☆74Dec 12, 2025Updated 5 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 7 years ago
- Yescrypt Hash Cracker☆16Jan 13, 2026Updated 4 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆97Apr 9, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15May 2, 2024Updated 2 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 5 months ago
- Command line interface to interact with hashes.com escrow service.☆45Mar 12, 2026Updated 2 months ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 5 months ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 5 months ago
- Tools to recover, extract and decrypt Phantom wallets☆32May 12, 2026Updated last week
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Frontend for hashcat with integration of hashes.com escrow services.☆66Apr 18, 2026Updated last month
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 5 months ago
- Markov-chains for linguistically-correct password cracking☆64Mar 15, 2022Updated 4 years ago
- Everything and anything related to password spraying☆152May 20, 2024Updated last year
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 8 years ago
- Payload Generation Workflow☆41Jul 18, 2025Updated 10 months ago
- Team hashcat event writeups and tools☆52Aug 11, 2025Updated 9 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆153Jan 16, 2026Updated 4 months ago
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 5 months ago
- Exploit iDRAC 7 & 8 firmware < 2.52.52.52☆18Dec 10, 2021Updated 4 years ago
- Fast website scraper and wordlist generator☆84May 6, 2025Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- Generate graphs and charts based on password cracking result☆165Feb 17, 2023Updated 3 years ago