Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams
☆28Mar 16, 2026Updated 2 months ago
Alternatives and similar repositories for spider
Users that are interested in spider are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 8 months ago
- hashgen - the blazingly fast hash generator☆40May 12, 2026Updated last week
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- API tool for hashes.com escrow☆12May 2, 2026Updated 2 weeks ago
- Top hashpwn rules☆20Dec 12, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 5 months ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Various wordlists☆74Dec 12, 2025Updated 5 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆38Nov 25, 2025Updated 5 months ago
- Command line interface to interact with hashes.com escrow service.☆45Mar 12, 2026Updated 2 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆97Apr 9, 2026Updated last month
- ☆38Sep 29, 2020Updated 5 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated 3 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 5 months ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆15Apr 16, 2023Updated 3 years ago
- Yescrypt Hash Cracker☆16Jan 13, 2026Updated 4 months ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 5 months ago
- Tools to recover, extract and decrypt Phantom wallets☆32May 12, 2026Updated last week
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆95Jul 28, 2024Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆153Jan 16, 2026Updated 4 months ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Random Hashcat Scrips☆40Oct 12, 2024Updated last year
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 7 years ago
- ☆123Oct 27, 2022Updated 3 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Tools to recover, extract and decrypt metamask wallets☆26May 12, 2026Updated last week
- Go implementation of scrypt and yescrypt key derivation and password hashing functions☆19Aug 21, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 5 months ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 5 months ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago