f0cker / pyhashcatLinks
Python bindings for hashcat
☆33Updated 4 years ago
Alternatives and similar repositories for pyhashcat
Users that are interested in pyhashcat are comparing it to the libraries listed below
Sorting:
- ☆37Updated 5 years ago
- Detect & filter duplicate hashcat rules☆47Updated last year
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Updated 6 years ago
- Collection of hashcat lists and things.☆51Updated 6 years ago
- A new web frontend for Hashtopolis☆41Updated this week
- Machine-learn password mangling rules☆115Updated 2 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 2 months ago
- Command line interface to interact with hashes.com escrow service.☆44Updated last month
- Hash cracking WebApp & Server for hashcat☆47Updated 3 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Updated 2 years ago
- FETCH THE PASSWORD STRETCHER☆38Updated 3 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated 6 months ago
- Legba recipes.☆51Updated last year
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆94Updated last year
- Official python agent for using the distributed hashcracker Hashtopolis☆78Updated last month
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Updated last month
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Python port of Pipal for password analytics☆22Updated 2 years ago
- ☆23Updated 5 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated 2 years ago
- A simple yet beautiful phishing proxy.☆59Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆119Updated 3 weeks ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago