hashtopolis / server
Hashtopolis - distributed password cracking with Hashcat
☆1,504Updated this week
Alternatives and similar repositories for server:
Users that are interested in server are comparing it to the libraries listed below
- PACK (Password Analysis and Cracking Kit)☆814Updated 5 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,247Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,699Updated 2 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,500Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,246Updated 4 months ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,478Updated 5 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,829Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,056Updated this week
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆556Updated last year
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,075Updated this week
- Standalone password candidate generator using the PRINCE algorithm☆438Updated last year
- Small utilities that are useful in advanced password cracking☆1,400Updated 6 months ago
- pwning IPv4 via IPv6☆1,752Updated 11 months ago
- Steal Net-NTLM Hash using Bad-PDF☆1,086Updated 4 years ago
- large hashcat rulesets generated from real-world compromised passwords☆393Updated 4 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆534Updated 8 years ago
- SensePost's modified hostapd for wifi attacks.☆558Updated 5 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,298Updated 3 years ago
- Pipal, THE password analyser☆636Updated last year
- A default credential scanner.☆1,460Updated 3 years ago
- An all-in-one WPA/WPS toolkit☆407Updated last year
- Small tool to capture packets from wlan devices.☆1,891Updated this week
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,687Updated 3 months ago
- CeWL is a Custom Word List Generator☆2,077Updated 3 months ago
- HTA encryption tool for RedTeams☆1,376Updated 2 years ago
- Undetectable Windows Payload Generation☆1,568Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,577Updated 4 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,345Updated 4 years ago
- A mostly-serverless distributed hash cracking platform☆800Updated 9 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,105Updated 7 years ago