defuse / crackstation-hashdb
CrackStation.net's Lookup Table Implementation.
☆372Updated 6 years ago
Alternatives and similar repositories for crackstation-hashdb:
Users that are interested in crackstation-hashdb are comparing it to the libraries listed below
- Source code for my crackstation.net website.☆143Updated 3 years ago
- Pipal, THE password analyser☆641Updated last year
- Standalone password candidate generator using the PRINCE algorithm☆443Updated last year
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆545Updated 8 years ago
- A framework for layer 2 attacks☆759Updated last year
- coWPAtty: WPA2-PSK Cracking☆201Updated 6 years ago
- PACK (Password Analysis and Cracking Kit)☆827Updated 5 years ago
- High-Performance word generator with a per-position configureable charset☆449Updated 2 years ago
- GUI frontend to John the Ripper password cracker☆563Updated last year
- Plugins for Metasploit Framework☆449Updated 6 years ago
- Software to identify the different types of hashes -☆1,371Updated 2 years ago
- Word-generator based on per-position markov-chains☆175Updated last year
- DMitry (Deepmagic Information Gathering Tool)☆216Updated 8 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,528Updated 3 years ago
- SpeedPhishing Framework☆444Updated 5 years ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆736Updated 2 weeks ago
- Evil Twin Attack Bash script☆563Updated 9 years ago
- ☆546Updated last year
- The famous WPA precomputed cracker, Migrated from Google.☆1,094Updated 9 months ago
- NTP Main-in-the-Middle tool☆244Updated 3 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,723Updated 2 months ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆179Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,307Updated 3 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,436Updated last year
- ☆246Updated 8 years ago
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆563Updated last year
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated last month
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆224Updated 3 years ago
- Password Hash Identification☆219Updated 11 years ago