Various wordlists
☆72Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for wordlist
Users that are interested in wordlist are comparing it to the libraries listed below
Sorting:
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 2 weeks ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 2 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated this week
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 2 months ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 5 months ago
- ☆11Dec 5, 2020Updated 5 years ago
- Custom hashcat kernel for new Metamask Vaults☆18Dec 12, 2025Updated 2 months ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- These are payloads to hunt for various bugs in web applications. from SQLi, xss, RCE to path traversal and more with XSS and fuzzing.☆11Oct 3, 2020Updated 5 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- ☆20May 25, 2025Updated 9 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆140Jan 16, 2026Updated last month
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Tools to recover, extract and decrypt Phantom wallets☆31Feb 10, 2026Updated 2 weeks ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 7 years ago
- ☆13Mar 15, 2022Updated 3 years ago
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 2 weeks ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- Burp Extension for a passive scanning JS files for endpoint links.☆56Nov 20, 2024Updated last year
- ☆120Oct 27, 2022Updated 3 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆25May 30, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago