Top hashpwn rules
☆20Dec 12, 2025Updated 5 months ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆38Nov 25, 2025Updated 5 months ago
- hashgen - the blazingly fast hash generator☆40May 12, 2026Updated last week
- ☆38Sep 29, 2020Updated 5 years ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 5 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated 3 months ago
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 5 months ago
- Yescrypt Hash Cracker☆16Jan 13, 2026Updated 4 months ago
- ☆39Jan 7, 2025Updated last year
- Various wordlists☆74Dec 12, 2025Updated 5 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- API tool for hashes.com escrow☆12May 2, 2026Updated 2 weeks ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 8 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 9 months ago
- ☆14Mar 19, 2024Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆26May 12, 2026Updated last week
- Custom rules by cyclone☆16Dec 12, 2025Updated 5 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆97Apr 9, 2026Updated last month
- A tool that adds reproducible UUIDs to YARA rules☆13Updated this week
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Command line interface to interact with hashes.com escrow service.☆45Mar 12, 2026Updated 2 months ago
- ☆123Oct 27, 2022Updated 3 years ago
- User Enumeration of Microsoft Teams users via API☆188Mar 16, 2026Updated 2 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 7 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆45May 6, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 5 months ago
- ☆20Jan 8, 2026Updated 4 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 5 months ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 8 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆377Mar 24, 2026Updated last month