Small utilities that are useful in advanced password cracking
☆1,562Nov 8, 2025Updated 5 months ago
Alternatives and similar repositories for hashcat-utils
Users that are interested in hashcat-utils are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High-Performance word generator with a per-position configureable charset☆499Jun 20, 2022Updated 3 years ago
- Standalone password candidate generator using the PRINCE algorithm☆486Oct 30, 2023Updated 2 years ago
- Word-generator based on per-position markov-chains☆188Oct 27, 2023Updated 2 years ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,359Updated this week
- World's fastest and most advanced password recovery utility☆25,732Feb 20, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Crack password hashes without the fuss☆1,389Jan 10, 2022Updated 4 years ago
- Advanced CPU-based password recovery utility☆2,236Sep 30, 2022Updated 3 years ago
- Small tool to capture packets from wlan devices.☆2,114Apr 6, 2026Updated last week
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆600Aug 19, 2025Updated 7 months ago
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆117Jan 3, 2024Updated 2 years ago
- Hashtopolis - distributed password cracking with Hashcat☆1,735Updated this week
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆12,970Updated this week
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆562Jan 3, 2017Updated 9 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,818Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PACK (Password Analysis and Cracking Kit)☆872Dec 10, 2019Updated 6 years ago
- WiFi security auditing tools suite☆7,107Jul 28, 2025Updated 8 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,612Dec 9, 2021Updated 4 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,236Oct 4, 2023Updated 2 years ago
- extract information from password-protected .7z archives (and .sfx files) such that you can crack these "hashes" with hashcat☆423Jun 15, 2024Updated last year
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,527Jul 15, 2019Updated 6 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,413Jan 26, 2026Updated 2 months ago
- Software to identify the different types of hashes -☆1,453Jun 20, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pipal, THE password analyser☆662Aug 27, 2023Updated 2 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,970Mar 30, 2026Updated 2 weeks ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,480Sep 22, 2024Updated last year
- PMK and PMKID database☆86Feb 24, 2026Updated last month
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,048Updated this week
- CeWL is a Custom Word List Generator☆2,633Apr 4, 2026Updated last week
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,642Updated this week
- ☆37Sep 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Ncrack network authentication tool☆1,201Apr 14, 2024Updated 2 years ago
- Rewrite of the popular wireless network auditor, "wifite"☆7,736Aug 20, 2024Updated last year
- Official python agent for using the distributed hashcracker Hashtopolis☆80Mar 20, 2026Updated 3 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,854Jun 15, 2020Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆2,026Jan 6, 2026Updated 3 months ago
- ☆25May 18, 2021Updated 4 years ago