Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams
☆28Dec 16, 2025Updated 2 months ago
Alternatives and similar repositories for spider
Users that are interested in spider are comparing it to the libraries listed below
Sorting:
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆30Sep 15, 2025Updated 5 months ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 2 weeks ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 2 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated this week
- ☆37Sep 29, 2020Updated 5 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Command line interface to interact with hashes.com escrow service.☆44Feb 10, 2026Updated 2 weeks ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 2 months ago
- Various wordlists☆72Dec 12, 2025Updated 2 months ago
- Tools to recover, extract and decrypt Phantom wallets☆31Feb 10, 2026Updated 2 weeks ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆95Jul 28, 2024Updated last year
- Random Hashcat Scrips☆36Oct 12, 2024Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆140Jan 16, 2026Updated last month
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- ☆120Oct 27, 2022Updated 3 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- ☆10Jan 8, 2018Updated 8 years ago
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 2 weeks ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago