Small utilities that are useful in advanced password cracking
☆1,551Nov 8, 2025Updated 3 months ago
Alternatives and similar repositories for hashcat-utils
Users that are interested in hashcat-utils are comparing it to the libraries listed below
Sorting:
- High-Performance word generator with a per-position configureable charset☆497Jun 20, 2022Updated 3 years ago
- Word-generator based on per-position markov-chains☆186Oct 27, 2023Updated 2 years ago
- Standalone password candidate generator using the PRINCE algorithm☆479Oct 30, 2023Updated 2 years ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,325Updated this week
- World's fastest and most advanced password recovery utility☆25,499Feb 20, 2026Updated last week
- Small tool to capture packets from wlan devices.☆2,086Feb 22, 2026Updated last week
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆597Aug 19, 2025Updated 6 months ago
- Crack password hashes without the fuss☆1,384Jan 10, 2022Updated 4 years ago
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆115Jan 3, 2024Updated 2 years ago
- Hashtopolis - distributed password cracking with Hashcat☆1,716Feb 20, 2026Updated last week
- Advanced CPU-based password recovery utility☆2,253Sep 30, 2022Updated 3 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆12,763Feb 22, 2026Updated last week
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,803Updated this week
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆561Jan 3, 2017Updated 9 years ago
- PACK (Password Analysis and Cracking Kit)☆867Dec 10, 2019Updated 6 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,606Dec 9, 2021Updated 4 years ago
- WiFi security auditing tools suite☆6,968Jul 28, 2025Updated 7 months ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,219Oct 4, 2023Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,353Jan 26, 2026Updated last month
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,530Jul 15, 2019Updated 6 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,959Nov 17, 2025Updated 3 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,465Sep 22, 2024Updated last year
- extract information from password-protected .7z archives (and .sfx files) such that you can crack these "hashes" with hashcat☆424Jun 15, 2024Updated last year
- Software to identify the different types of hashes -☆1,445Jun 20, 2022Updated 3 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,536Feb 21, 2026Updated last week
- CeWL is a Custom Word List Generator☆2,574Feb 20, 2026Updated last week
- Pipal, THE password analyser☆661Aug 27, 2023Updated 2 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,860Dec 31, 2025Updated 2 months ago
- SMBMap is a handy SMB enumeration tool☆2,020Jan 6, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆15,493Updated this week
- Rewrite of the popular wireless network auditor, "wifite"☆7,617Aug 20, 2024Updated last year
- Ncrack network authentication tool☆1,194Apr 14, 2024Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,838Jun 15, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,913Nov 19, 2025Updated 3 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- PowerShell Pass The Hash Utils☆1,722Dec 9, 2018Updated 7 years ago
- The ultimate WinRM shell for hacking/pentesting