clem9669 / wordlistsLinks
Various wordlists FR & EN - Cracking French passwords
☆285Updated this week
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- Rule for hashcat or john. Aiming to crack how people generate their password☆437Updated 9 months ago
- large hashcat rulesets generated from real-world compromised passwords☆396Updated 4 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆492Updated 8 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆128Updated last year
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆116Updated 2 months ago
- Zero Infrastructure Password Cracking☆408Updated 10 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆98Updated 6 months ago
- ☆97Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆300Updated last year
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆400Updated 2 years ago
- A web front-end for password cracking and analytics☆380Updated last month
- Kraken: A multi-platform distributed brute-force password cracking system☆316Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,540Updated 3 years ago
- Many Evilginx2 Phishlets Uptodate☆50Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆109Updated 3 weeks ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆89Updated last year
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,316Updated 2 months ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,049Updated 3 years ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆448Updated 3 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆415Updated 3 weeks ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆367Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆73Updated 3 weeks ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 11 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆333Updated 8 months ago
- The Havoc Framework☆58Updated 2 years ago
- OneRuleToRuleThemAll... hashcat optimised rule☆96Updated 6 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆119Updated 8 years ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆139Updated 8 months ago
- Open-Source Phishing Toolkit☆199Updated 8 months ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆516Updated 10 months ago