Custom hashcat kernel for new Metamask Vaults
☆19Dec 12, 2025Updated 3 months ago
Alternatives and similar repositories for hashcat_26620_kernel
Users that are interested in hashcat_26620_kernel are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 3 months ago
- Tools to recover, extract and decrypt metamask wallets☆24Mar 12, 2026Updated last week
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- Tools to recover, extract and decrypt Phantom wallets☆30Mar 12, 2026Updated last week
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 3 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 3 months ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- Command line interface to interact with hashes.com escrow service.☆44Mar 12, 2026Updated last week
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated last week
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Various wordlists☆74Dec 12, 2025Updated 3 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- 🚀 To step up in Quantum Computing, Here is a toolkit implementing fundamental quantum algorithms using IBM's Qiskit framework. Features …☆13Jan 6, 2025Updated last year
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated last month
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆11Jul 24, 2025Updated 7 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Feb 28, 2026Updated 2 weeks ago
- Cracking PDF password protection via hashcat.☆15Dec 24, 2025Updated 2 months ago
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).☆13Jul 6, 2024Updated last year
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 10 months ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- Extend wordlist by appending digits and special characters to each word.☆10Apr 26, 2023Updated 2 years ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- This script is written in Solidity and Python3, it allows you to sell Honeypot tokens despite broken TransferFrom function.☆13Jan 28, 2022Updated 4 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 9 years ago
- ☆20Jul 23, 2025Updated 7 months ago
- Python library for the https://mega.nz/ API.☆13Feb 13, 2024Updated 2 years ago