hashcat / maskprocessor
High-Performance word generator with a per-position configureable charset
☆450Updated 2 years ago
Alternatives and similar repositories for maskprocessor:
Users that are interested in maskprocessor are comparing it to the libraries listed below
- Standalone password candidate generator using the PRINCE algorithm☆446Updated last year
- Word-generator based on per-position markov-chains☆175Updated last year
- Small utilities that are useful in advanced password cracking☆1,431Updated 9 months ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆547Updated 8 years ago
- Pipal, THE password analyser☆643Updated last year
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆566Updated last year
- PACK (Password Analysis and Cracking Kit)☆830Updated 5 years ago
- Modified hostapd to facilitate AP impersonation attacks☆505Updated 6 years ago
- Hashtopolis - distributed password cracking with Hashcat☆1,549Updated last week
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 6 months ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- MSFvenom Payload Creator (MSFPC)☆1,260Updated 3 years ago
- ☆548Updated last year
- Specify targets and run sets of tools against them☆389Updated 6 years ago
- coWPAtty: WPA2-PSK Cracking☆207Updated 6 years ago
- GUI frontend to John the Ripper password cracker☆570Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,729Updated 2 months ago
- Plugins for Metasploit Framework☆449Updated 6 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆224Updated 3 years ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,496Updated 5 years ago
- Python script to crack hashes using online services☆89Updated 4 years ago
- Ncrack network authentication tool☆1,123Updated last year
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated 2 months ago
- Hashcat web interface☆301Updated last month
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆112Updated last year
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆388Updated last year
- Password lists for use in penetration testing situations, broken up by TLD.☆319Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆408Updated 3 years ago
- CrackStation.net's Lookup Table Implementation.☆373Updated 6 years ago