Python bindings for hashcat
☆33Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for pyhashcat
Users that are interested in pyhashcat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of tools used for researching passwords☆19Dec 17, 2024Updated last year
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Analyze and modify hashcat .restore files☆34Nov 19, 2022Updated 3 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆37Sep 29, 2020Updated 5 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Apr 3, 2026Updated last week
- Hash cracking WebApp & Server for hashcat☆47Jul 20, 2022Updated 3 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated 2 months ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆37Nov 25, 2025Updated 4 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Mar 19, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Mar 14, 2023Updated 3 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 10 years ago
- Spark—Python学习笔记☆11Sep 25, 2018Updated 7 years ago
- Collection of hashcat lists and things.☆50Dec 18, 2019Updated 6 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 4 months ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- GPU is unfriendly for WebDollar - argon2-gpu for WebDollar☆14Aug 17, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nano Scraper, the next-generation web scraper!☆10Jan 23, 2021Updated 5 years ago
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- CrackQ: A Python Hashcat cracking queue system☆939Sep 3, 2024Updated last year
- Quickly look up hashes in your terminal using the HashMob API 🔥☆14Apr 16, 2023Updated 2 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆145Jan 16, 2026Updated 2 months ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Use comboclean to make it easy to use email and passwords, from big combolists, in your script.☆15Aug 27, 2021Updated 4 years ago
- Simple Amazon IoT compatible client☆13Oct 24, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A token system based on proof of transport☆11Dec 21, 2021Updated 4 years ago
- ☆12Oct 5, 2025Updated 6 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Password lists generated by deep learning algorithms.☆33Jan 20, 2020Updated 6 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Jan 22, 2023Updated 3 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆14Jul 8, 2019Updated 6 years ago
- Polish dicts for password cracking.☆10Dec 6, 2016Updated 9 years ago