Custom rules by cyclone
☆16Dec 12, 2025Updated 3 months ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- Various wordlists☆74Dec 12, 2025Updated 3 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated last week
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Feb 28, 2026Updated 2 weeks ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 3 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆51Nov 2, 2025Updated 4 months ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 3 months ago
- ☆11Jul 3, 2021Updated 4 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Tools to recover, extract and decrypt Phantom wallets☆30Mar 12, 2026Updated last week
- ☆121Oct 27, 2022Updated 3 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- A collection of leethobbit's templates, Canvas dashboards, or other useful things I've created for Obsidian.☆29May 25, 2024Updated last year
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Tools to recover, extract and decrypt metamask wallets☆24Mar 12, 2026Updated last week
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆15Jun 4, 2018Updated 7 years ago
- ☆13Jan 27, 2024Updated 2 years ago
- This Python tool uses PimEyes for reverse image searches, returning links to pages where matches are found, useful for investigations and…☆11Sep 12, 2024Updated last year
- ☆20Feb 1, 2026Updated last month
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- Diving into Popularity of GitHub Repositories☆13Sep 15, 2023Updated 2 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- Outputs a reduced keyspace of random or sequential hex digits.☆46Oct 11, 2016Updated 9 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- combo lists for dev testing☆11Jan 15, 2019Updated 7 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- Official repository of "Efficient and Effective Query Expansion for Web Search", Short Paper @ CIKM 2018☆15Nov 17, 2019Updated 6 years ago