Top hashpwn rules
☆20Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 2 weeks ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 2 months ago
- ☆37Sep 29, 2020Updated 5 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Custom hashcat kernel for new Metamask Vaults☆18Dec 12, 2025Updated 2 months ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆37Jan 7, 2025Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Various wordlists☆72Dec 12, 2025Updated 2 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- ☆14Mar 19, 2024Updated last year
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 2 weeks ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 5 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated this week
- Custom rules by cyclone☆16Dec 12, 2025Updated 2 months ago
- User Enumeration of Microsoft Teams users via API☆185Mar 27, 2024Updated last year
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- ☆120Oct 27, 2022Updated 3 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated last week
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Tools to recover, extract and decrypt Phantom wallets☆31Feb 10, 2026Updated 2 weeks ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆12Feb 24, 2023Updated 3 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- Command line interface to interact with hashes.com escrow service.☆44Feb 10, 2026Updated 2 weeks ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆63Jan 10, 2025Updated last year
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year