cyclone-github / yescrypt_crackLinks
Yescrypt Hash Cracker
☆14Updated last week
Alternatives and similar repositories for yescrypt_crack
Users that are interested in yescrypt_crack are comparing it to the libraries listed below
Sorting:
- a markov based rule generator for hashcat/mdxfind/jtr☆24Updated last week
- Top hashpwn rules☆20Updated last week
- top usernames from azure survey 2025☆14Updated 7 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆32Updated 2 weeks ago
- P2P Communications of Named Pipes☆12Updated last week
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆26Updated 3 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆35Updated 9 months ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆38Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- Eating 2FA for Breakfast☆58Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 9 months ago
- Find Inbound Email Domains☆35Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 8 months ago
- ☆37Updated 5 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆52Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 8 months ago
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- Yet Another LinkedIn Scraper☆33Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆36Updated last week
- fully async implementation of Dirkjan's ROADTools☆33Updated 9 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆40Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 9 months ago