Custom hashcat kernel for new Metamask Vaults
☆18Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for hashcat_26620_kernel
Users that are interested in hashcat_26620_kernel are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 2 months ago
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 2 weeks ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Tools to recover, extract and decrypt Phantom wallets☆31Feb 10, 2026Updated 2 weeks ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 2 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆30Sep 15, 2025Updated 5 months ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 2 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- Command line interface to interact with hashes.com escrow service.☆44Feb 10, 2026Updated 2 weeks ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- Go implementation of scrypt and yescrypt key derivation and password hashing functions☆17Aug 21, 2024Updated last year
- 🛠️ Simple EXE-File Pumper, written in C#☆17Nov 7, 2020Updated 5 years ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 2 weeks ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 8 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- Bitcoin Hush☆12Apr 29, 2020Updated 5 years ago
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆35Jul 20, 2023Updated 2 years ago
- Securely access a server's terminal even when they are behind firewalls☆58Nov 22, 2025Updated 3 months ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- ☆12Feb 4, 2025Updated last year
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 5 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Repository for controllers for PPCG challenge☆11Mar 6, 2015Updated 10 years ago
- ☆10May 26, 2023Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ☆12Jan 21, 2025Updated last year
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- The very functional operating system☆11Oct 4, 2019Updated 6 years ago
- ☆11Jan 18, 2020Updated 6 years ago